Results

By type

          2022-07-01 03:32:33,881 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-01 03:32:34,720 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-01 03:32:35.433  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 01, 2022 3:32:37 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 01, 2022 3:32:37 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 01, 2022 3:32:37 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 01, 2022 3:32:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-01 03:32:37.876 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-01 03:32:38.164  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-01 03:32:38.327  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-01 03:32:38.998 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-01 03:32:39.001 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-07-01 03:32:39.002 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-01 03:32:39.006 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-01 03:32:39.045 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-01 03:32:39.048 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-01 03:32:39.159 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-01 03:32:39.676 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 01, 2022 3:32:40 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-01 03:32:40.530  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.44 seconds (JVM running for 9.194)
Jul 01, 2022 3:33:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-01 03:33:41.800  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 03:33:41.828 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 03:33:41.872 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-01 03:33:41.877 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 03:33:41.894  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-01 03:33:41.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 03:33:41.897  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 03:33:41.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 03:33:41.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 03:33:41.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 03:33:41.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 03:33:41.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 03:33:41.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 03:33:41.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 03:33:41.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 03:33:41.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 03:33:42.465  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 03:33:42.468  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 03:33:42.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 03:33:42.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 03:33:42.478  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 03:33:42.480  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 03:33:42.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 03:33:42.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 03:33:42.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 03:33:42.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 03:33:42.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 03:33:42.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 03:33:42.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 03:33:42.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 03:33:42.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 03:33:42.504 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 03:33:42.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:d8:36:40:12:25:50:ce:53:48:02:f3:ba:43:a3:6c:44:75:fa:a8]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 04:55:56.364  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 04:55:56.369 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 04:55:56.375 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 04:55:56.377 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 04:55:56.378  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 04:55:56.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 04:55:56.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 04:55:56.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 04:55:56.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 04:55:56.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 04:55:56.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 04:55:56.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 04:55:56.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 04:55:56.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 04:55:56.610  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 04:55:56.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 04:55:56.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 04:55:56.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 04:55:56.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 04:55:56.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 04:55:56.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:55:56.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:55:56.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:55:56.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:55:56.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:55:56.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:55:56.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:55:56.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:55:56.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:55:56.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 04:55:56.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:0f:9a:dc:4f:8e:76:a9:be:87:52:0a:ac:93:da:fc:d7:12:ef:4d]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 04:57:58.398  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 04:57:58.401 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 04:57:58.404 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-01 04:57:58.405 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 04:57:58.406  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-01 04:57:58.407  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 04:57:58.407  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 04:57:58.408 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 04:57:58.409 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 04:57:58.409 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 04:57:58.417 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 04:57:58.418 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 04:57:58.418 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 04:57:58.418 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 04:57:58.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 04:57:58.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 04:57:58.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 04:57:58.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 04:57:58.558  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 04:57:58.558  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 04:57:58.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:57:58.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:57:58.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:57:58.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:57:58.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:57:58.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:57:58.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:57:58.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:57:58.566 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:57:58.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 04:57:58.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:c6:61:37:e7:d8:37:1e:0c:fc:48:06:dc:65:ae:f3:2d:2c:ea:22]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 04:59:14.385  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 04:59:14.386 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 04:59:14.388 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-01 04:59:14.389 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 04:59:14.389  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-01 04:59:14.390  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 04:59:14.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 04:59:14.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 04:59:14.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 04:59:14.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 04:59:14.397 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 04:59:14.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 04:59:14.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 04:59:14.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 04:59:14.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 04:59:14.568  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 04:59:14.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 04:59:14.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 04:59:14.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 04:59:14.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 04:59:14.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:59:14.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:59:14.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:59:14.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:59:14.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:59:14.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:59:14.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 04:59:14.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 04:59:14.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 04:59:14.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 04:59:14.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:2a:1c:10:6f:12:3f:eb:5a:9b:9a:d5:74:5b:8a:13:b5:39:cd:22]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:01:10.737  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:01:10.739 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:01:10.740 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:01:10.741 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:01:10.741  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:01:10.742  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:01:10.742  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:01:10.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:01:10.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:01:10.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:01:10.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:01:10.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:01:10.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:01:10.750 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:01:10.954  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:01:10.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:01:10.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:01:10.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:01:10.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:01:10.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:01:10.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:01:10.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:01:10.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:01:10.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:01:10.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:01:10.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:01:10.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:01:10.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:01:10.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:01:10.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:01:10.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:e9:e1:09:47:f1:40:0f:26:df:38:ae:22:44:86:f0:49:1b:00:68]
            modulus: a8d93eba707d86aa0674b586b59fbc6fbaead1c8b76aaf65d73d245e168d07ee591e83e482477f2fa45236d343de21f6bc012d4883d7270e73bd66eb2e3a9bd5bd2d7582d995bf1c3816b9bb9e0a183c55f9dd6f4421c1e01624ef56e59973893bf94ed5da7b5d28761eb3235e13a602840453046edf8378fe20d9efe787e4b977bb8009f8adc0ea5d97182f6275f511c76c5ca22cd21a6b69a106bb1676d90a7cd8dc651febe304a1d45ae574b26103705e7a662385347e6745c9b3739cf91ca3c5b280860570b5263e2599062c212c4e96d0f2b6d3293c0f4501ff86cf2ee14fa8da1b6ae636afa6966cde93e47da9a06e826ac3dabba65884320330105d39
    public exponent: 10001

] 
2022-07-01 05:05:08.131  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:05:08.134 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:05:08.136 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:05:08.137 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:05:08.137  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:05:08.138  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:05:08.139  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:05:08.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:05:08.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:05:08.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:05:08.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:05:08.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:05:08.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:05:08.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:05:08.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:05:08.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:05:08.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:05:08.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:05:08.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:05:08.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:05:08.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:05:08.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:05:08.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:05:08.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:05:08.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:05:08.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:05:08.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:05:08.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:05:08.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:05:08.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:05:08.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:a2:e0:e2:72:87:1e:73:40:a4:a2:e0:1d:3a:c6:72:2f:c1:d7:39]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:08:58.270  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:08:58.272 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:08:58.274 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:08:58.275 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:08:58.275  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:08:58.276  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:08:58.277  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:08:58.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:08:58.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:08:58.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:08:58.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:08:58.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:08:58.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:08:58.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:08:58.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:08:58.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:08:58.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:08:58.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:08:58.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:08:58.430  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:08:58.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:08:58.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:08:58.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:08:58.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:08:58.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:08:58.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:08:58.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:08:58.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:08:58.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:08:58.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:08:58.442 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:7c:7e:c0:be:9f:ca:3c:09:41:a1:26:51:65:29:3e:52:bc:d5:e6]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:10:40.441  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:10:40.442 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:10:40.443 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:10:40.444 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:10:40.444  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:10:40.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:10:40.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:10:40.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:10:40.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:10:40.447 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:10:40.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:10:40.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:10:40.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:10:40.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:10:40.621  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:10:40.622  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:10:40.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:10:40.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:10:40.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:10:40.625  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:10:40.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:10:40.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:10:40.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:10:40.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:10:40.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:10:40.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:10:40.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:10:40.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:10:40.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:10:40.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:10:40.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:f2:9f:07:ac:8f:52:b5:79:b7:72:e6:36:9b:48:7c:15:da:e1:aa]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:14:30.504  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:14:30.507 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:14:30.510 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:14:30.511 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:14:30.511  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:14:30.512  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:14:30.512  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:14:30.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:14:30.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:14:30.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:14:30.519 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:14:30.520 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:14:30.520 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:14:30.520 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:14:30.701  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:14:30.702  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:14:30.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:14:30.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:14:30.704  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:14:30.705  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:14:30.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:14:30.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:14:30.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:14:30.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:14:30.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:14:30.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:14:30.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:14:30.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:14:30.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:14:30.712 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:14:30.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:fb:71:af:2f:f0:21:fa:44:57:1a:73:a3:aa:83:ab:78:5e:6b:5a]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:16:26.270  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:16:26.271 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:16:26.273 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-01 05:16:26.274 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:16:26.274  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-01 05:16:26.275  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:16:26.275  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:16:26.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:16:26.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:16:26.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:16:26.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:16:26.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:16:26.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:16:26.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:16:26.421  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:16:26.422  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:16:26.422 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:16:26.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:16:26.425  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:16:26.425  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:16:26.426 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:16:26.426 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:16:26.427 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:16:26.428 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:16:26.428 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:16:26.428 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:16:26.429 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:16:26.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:16:26.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:16:26.431 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:16:26.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:66:20:c6:ec:19:f1:83:af:4f:7f:de:ea:6e:90:b4:05:e6:ab:da]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:18:35.449  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:18:35.450 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:18:35.452 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:18:35.453 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:18:35.453  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:18:35.454  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:18:35.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:18:35.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:18:35.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:18:35.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:18:35.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:18:35.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:18:35.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:18:35.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:18:35.698  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:18:35.699  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:18:35.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:18:35.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:18:35.701  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:18:35.701  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:18:35.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:18:35.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:18:35.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:18:35.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:18:35.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:18:35.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:18:35.704 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:18:35.704 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:18:35.704 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:18:35.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:18:35.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:ec:0f:15:a6:8a:29:a5:d2:ff:71:fe:d1:d0:87:a2:3c:d2:3c:db]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:23:00.982  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:23:00.986 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:23:00.990 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-01 05:23:00.992 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:23:00.992  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-01 05:23:00.993  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:23:00.994  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:23:00.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:23:00.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:23:00.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:23:01.005 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:23:01.006 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:23:01.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:23:01.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:23:01.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:23:01.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:23:01.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:23:01.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:23:01.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:23:01.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:23:01.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:01.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:01.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:01.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:01.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:01.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:01.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:01.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:01.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:01.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:23:01.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:6e:58:23:94:24:11:6b:87:fa:7c:51:c9:3d:bf:b3:1d:c3:8f:cc]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:23:21.984  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:23:21.986 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:23:21.988 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:23:21.989 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:23:21.990  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:23:21.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:23:21.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:23:21.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:23:21.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:23:21.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:23:21.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:23:22.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:23:22.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:23:22.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:23:22.167  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:23:22.169  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:23:22.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:23:22.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:23:22.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:23:22.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:23:22.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:22.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:22.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:22.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:22.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:22.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:22.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:22.177 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:22.177 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:22.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:23:22.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:6a:d6:c0:14:37:f9:52:b7:a3:98:47:88:e0:96:09:33:13:95:fb]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:23:26.832  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:23:26.834 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:23:26.836 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-01 05:23:26.837 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:23:26.838  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-01 05:23:26.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:23:26.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:23:26.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:23:26.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:23:26.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:23:26.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:23:26.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:23:26.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:23:26.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:23:26.975  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:23:26.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:23:26.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:23:26.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:23:26.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:23:26.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:23:26.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:26.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:26.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:26.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:26.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:26.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:26.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:23:26.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:23:26.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:23:26.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:23:26.989 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:d0:95:18:2c:81:d1:15:93:fb:dd:ef:18:15:4a:a3:c2:42:3f:76]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:27:12.620  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:27:12.622 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:27:12.623 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:27:12.624 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:27:12.624  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:27:12.625  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:27:12.625  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:27:12.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:27:12.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:27:12.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:27:12.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:27:12.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:27:12.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:27:12.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:27:12.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:27:12.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:27:12.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:27:12.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:27:12.845  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:27:12.845  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:27:12.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:27:12.846 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:27:12.846 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:27:12.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:27:12.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:27:12.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:27:12.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:27:12.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:27:12.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:27:12.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:27:12.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:59:17:26:0c:9d:a3:f1:e3:ce:62:f7:88:09:95:68:28:21:d3:1e]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:31:55.668  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:31:55.671 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:31:55.673 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:31:55.674 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:31:55.675  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:31:55.675  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:31:55.676  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:31:55.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:31:55.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:31:55.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:31:55.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:31:55.683 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:31:55.683 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:31:55.684 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:31:55.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:31:55.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:31:55.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:31:55.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:31:55.926  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:31:55.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:31:55.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:31:55.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:31:55.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:31:55.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:31:55.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:31:55.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:31:55.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:31:55.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:31:55.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:31:55.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:31:55.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:02:ef:af:d4:a4:95:bc:79:f4:f2:73:9d:d2:0c:41:11:be:10:f5]
            modulus: d04dd638c2637e530772bb5995bcea852dedeb5ee35a002f11f2fe7d5c4337c1ed061786aa8800e20b0c799b09237ef51b0ecaee672301d63cccb4a88018acbeac97b1285cda88795d0cad836a444c8883996439c98c6a029f29f8b38878667c90edd2cf50bac1563cb92798f5e333162382f59079a140d07ca66846efb1f6e70f6f044a1b0eeee140902276475683a18dc6b293874f3a1f54d06224811f3baa69e3f1aaadca4c249466203537d859c56380e0abaa85769e2d1925ffdc4db620211009f3fd4137dd2ca58a30e5f026a3d4a6e59c17d039c872861cabad888dd3a06cb8d36f4f9f9ba315f8f89ddba5b223d128a8ca3cb852502e434ee6112609
    public exponent: 10001

] 
2022-07-01 05:35:57.910  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:35:57.912 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:35:57.914 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:35:57.915 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:35:57.915  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:35:57.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:35:57.917  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:35:57.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:35:57.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:35:57.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:35:57.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:35:57.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:35:57.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:35:57.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:35:58.110  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:35:58.111  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:35:58.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:35:58.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:35:58.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:35:58.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:35:58.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:35:58.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:35:58.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:35:58.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:35:58.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:35:58.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:35:58.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:35:58.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:35:58.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:35:58.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:35:58.121 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:bd:b5:5f:0f:b0:1a:b8:38:6f:05:2a:fd:e3:46:6f:ef:a2:b7:98]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:39:52.122  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:39:52.124 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:39:52.126 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:39:52.127 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:39:52.127  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:39:52.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:39:52.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:39:52.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:39:52.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:39:52.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:39:52.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:39:52.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:39:52.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:39:52.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:39:52.334  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:39:52.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:39:52.335 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:39:52.335 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:39:52.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:39:52.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:39:52.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:39:52.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:39:52.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:39:52.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:39:52.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:39:52.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:39:52.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:39:52.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:39:52.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:39:52.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:39:52.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:4f:d7:24:60:a9:50:e0:3f:ac:59:85:9e:47:92:05:5f:22:5a:8b]
            modulus: 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
    public exponent: 10001

] 
2022-07-01 05:44:40.756  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-01 05:44:40.758 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-01 05:44:40.760 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:44:40.761 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-01 05:44:40.761  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-01 05:44:40.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-01 05:44:40.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-01 05:44:40.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-01 05:44:40.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-01 05:44:40.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-01 05:44:40.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-01 05:44:40.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:44:40.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-01 05:44:40.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:44:40.948  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-01 05:44:40.948  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-01 05:44:40.949 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-01 05:44:40.949 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-01 05:44:40.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-01 05:44:40.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-01 05:44:40.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:44:40.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:44:40.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:44:40.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:44:40.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:44:40.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:44:40.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-01 05:44:40.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-01 05:44:40.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-01 05:44:40.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-01 05:44:40.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343366063067050649103981516106384914668502216658
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 01 03:30:24 UTC 2022
           Final Date: Wed Jun 30 03:30:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf
                       1d57c3fb96dc78dd469083289a0d5334307357c6
                       9ba470cb1d06677354bbfdb10a7b328f46246577
                       2d349cc65766358c1186f7f056e58ae9405e754e
                       d522d3a003ba04280584fc223f3b8d7161e1c1bc
                       9141e6bd18d9992c8075664eaf51acec02f0e1d6
                       bf8bb8eae872f21e5401b366a08ca1da40be5447
                       40e5e6720658d0832d583d04ce832f255a3474e7
                       aea9d70371b9e8b891d4cc3bef4947eb4d1e130e
                       75de045f6a6bd396a0f9ab4482852493f168d787
                       636257b4c1b302136e15d32a1716eccfc2b92f1d
                       b299f76a254df30a2287d369229ad85a81d289d8
                       fc2777f1842ad5f9b18405e821f1a3d9bb024fe8
                       b75d92b6743e4b420abd1fb20dad6e80028761bd
                       dc8ae4df24df34698067a694d7b518613f0b1a8e
                       89365640d86794edc502795e4411be9a21f08ba6
                       a919de224e863433be48ba85e54a1a4200e56114
                       8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8
                       4869f7e1f429b96c7e034d972e56b90d3e2c53d7
                       e5acfc8d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:3e:93:40:56:09:93:35:d2:1b:4e:f6:9b:c7:4f:f2:71:a6:19:d6]
            modulus: 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
    public exponent: 10001

]