Results

By type

          2022-08-13 03:09:34,299 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-13 03:09:36,008 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-13 03:09:37.065  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 13, 2022 3:09:40 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 13, 2022 3:09:40 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 13, 2022 3:09:40 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 13, 2022 3:09:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-13 03:09:41.368 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-13 03:09:41.827  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-13 03:09:42.136  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-13 03:09:43.541 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-13 03:09:43.548 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-08-13 03:09:43.550 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-13 03:09:43.558 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-13 03:09:43.610 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-08-13 03:09:43.614 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-08-13 03:09:43.816 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-13 03:09:44.819 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 13, 2022 3:09:46 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-13 03:09:46.513  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 13.656 seconds (JVM running for 16.876)
Aug 13, 2022 3:10:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-13 03:10:15.384  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 03:10:15.396 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 03:10:15.444 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-13 03:10:15.449 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 03:10:15.474  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-13 03:10:15.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 03:10:15.479  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 03:10:15.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 03:10:15.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 03:10:15.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 03:10:15.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 03:10:15.497 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 03:10:15.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 03:10:15.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 03:10:15.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 03:10:15.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 03:10:16.427  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 03:10:16.430  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 03:10:16.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 03:10:16.435 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 03:10:16.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 03:10:16.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 03:10:16.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 03:10:16.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 03:10:16.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 03:10:16.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 03:10:16.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 03:10:16.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 03:10:16.497 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 03:10:16.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 03:10:16.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 03:10:16.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 03:10:16.545 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:7e:2b:13:36:af:38:b5:f6:cb:dc:7d:16:f5:13:aa:d1:13:9e:f4]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:29:42.917  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:29:42.921 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:29:42.925 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:29:42.927 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:29:42.928  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:29:42.930  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:29:42.930  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:29:42.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:29:42.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:29:42.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:29:42.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:29:42.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:29:42.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:29:42.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:29:43.208  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:29:43.216  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:29:43.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:29:43.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:29:43.271  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:29:43.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:29:43.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:29:43.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:29:43.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:29:43.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:29:43.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:29:43.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:29:43.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:29:43.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:29:43.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:29:43.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:29:43.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:0d:ce:b4:ee:04:1d:d3:27:2b:e2:12:55:cb:e8:41:23:94:d9:b7]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:32:41.673  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:32:41.681 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:32:41.686 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:32:41.688 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:32:41.689  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:32:41.690  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:32:41.690  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:32:41.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:32:41.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:32:41.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:32:41.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:32:41.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:32:41.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:32:41.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:32:41.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:32:41.956  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:32:41.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:32:41.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:32:41.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:32:41.960  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:32:41.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:32:41.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:32:41.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:32:41.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:32:41.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:32:41.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:32:41.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:32:41.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:32:41.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:32:41.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:32:41.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:73:8f:a5:b9:a1:78:6f:35:a2:b2:b6:37:f1:77:7e:4a:c8:43:f9]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:34:00.869  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:34:00.870 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:34:00.872 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-13 04:34:00.873 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:34:00.874  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-13 04:34:00.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:34:00.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:34:00.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:34:00.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:34:00.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:34:00.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:34:00.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:34:00.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:34:00.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:34:01.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:34:01.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:34:01.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:34:01.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:34:01.093  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:34:01.093  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:34:01.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:34:01.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:34:01.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:34:01.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:34:01.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:34:01.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:34:01.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:34:01.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:34:01.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:34:01.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:34:01.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:25:ee:15:19:84:6f:69:20:59:c5:75:f7:3c:4d:a7:e4:71:12:87]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:36:29.357  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:36:29.359 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:36:29.362 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:36:29.364 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:36:29.365  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:36:29.366  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:36:29.367  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:36:29.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:36:29.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:36:29.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:36:29.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:36:29.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:36:29.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:36:29.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:36:29.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:36:29.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:36:29.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:36:29.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:36:29.596  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:36:29.600  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:36:29.601 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:36:29.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:36:29.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:36:29.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:36:29.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:36:29.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:36:29.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:36:29.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:36:29.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:36:29.616 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:36:29.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:76:13:a7:9c:84:73:ff:e1:c3:0f:bb:e2:16:60:ce:34:2e:ef:97]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:39:10.332  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:39:10.335 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:39:10.340 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-13 04:39:10.342 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:39:10.343  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-13 04:39:10.344  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:39:10.345  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:39:10.346 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:39:10.346 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:39:10.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:39:10.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:39:10.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:39:10.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:39:10.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:39:10.597  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:39:10.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:39:10.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:39:10.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:39:10.607  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:39:10.608  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:39:10.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:39:10.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:39:10.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:39:10.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:39:10.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:39:10.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:39:10.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:39:10.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:39:10.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:39:10.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:39:10.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: c82f0eb70294c51ef9c52e36739deea6cd435601dfa25310ac26bbb29ce52886d6718c3183f9301294480ad00e9ce9538953d89b092190247695f4d13529eae633c8660689655852578c5419103570226eb0e3d62a7aa8ada7a005ff3e73c033a6448731e154c9e45c8d8ed25560647b56e9be16fd401eda5fbf8e24cd627b05542b7d960bda60672794c4faccadfa2a25a1bcb0b0a40a95ea652dce93ddfa49548e220b579dfb8638fa1a2f032a67068be3cc6f0f8e6c9997708b33e82270e803d7a3063c8645c08fe706c34295b692d598b09aa2482a21f4447cfbf26d62827b3c5af86ae9b633b9d06ae32fb01c50033b567cb96a0a0650808d3c5d157bad4d510e294a52eeaecc4b02a093437c5d368f5e1ad104a5ed6cb9fcdf55127b673cfbe8113f238123850bc1f2b0fc7665a27b69365072f7fc1998b5b69f388aff7fd9d1dbea0ef390d11fc735d8ee0239bac4a723ee1e0fbd58168968e7c212993f2b8d87d331e79388592fdceeec8bb48149004b4b541874188d4ec451f51eb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:68:f4:9e:61:6e:c5:ad:a9:5f:f6:ec:0c:0d:29:6b:70:46:4c:47]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:41:29.833  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:41:29.836 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:41:29.839 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:41:29.840 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:41:29.841  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:41:29.842  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:41:29.843  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:41:29.843 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:41:29.844 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:41:29.844 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:41:29.854 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:41:29.856 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:41:29.856 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:41:29.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:41:30.080  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:41:30.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:41:30.081 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:41:30.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:41:30.084  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:41:30.084  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:41:30.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:41:30.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:41:30.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:41:30.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:41:30.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:41:30.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:41:30.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:41:30.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:41:30.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:41:30.091 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:41:30.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:59:7c:a5:e4:6b:6b:76:0e:61:4c:27:ee:61:af:37:13:6a:93:d6]
            modulus: c331f36c41af634af23deaa5e676f8bd5c3e5b506969d6101946fc4b6f9f4b2e2927d319a3e1704a575015c152ca1e5f05d414733d40019173f1cda5f2f4d41d9217517b57065b9463ec5148ecf9f922c22fb62a4d356bc93df58de319419d194ed99ab0206aaa0e22168e1b05752b5263c5391bd40f81ca7a9d8a4ac0c3eafe7865a2b54ccae5fd8a58f37778d6a9f43ce3c3c32688d028251ab6bbf3bed06ae3bb06ab94c0f1b248fb7a8b105e08b3c4eb3c04fd80cf112b734633fc1096a3826ca5529345a032adefecaa52cded6b42ddde4afa45d70eb23acb6ce9ea9ee574f1923ddc002d29f56493e4c252dd19121c9cc54eeae85a412d6730c1d8a833
    public exponent: 10001

] 
2022-08-13 04:45:25.662  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:45:25.664 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:45:25.666 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:45:25.667 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:45:25.668  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:45:25.672  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:45:25.673  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:45:25.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:45:25.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:45:25.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:45:25.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:45:25.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:45:25.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:45:25.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:45:25.927  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:45:25.928  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:45:25.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:45:25.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:45:25.931  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:45:25.931  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:45:25.932 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:45:25.932 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:45:25.933 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:45:25.934 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:45:25.934 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:45:25.935 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:45:25.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:45:25.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:45:25.938 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:45:25.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:45:25.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:25:a2:27:a8:a5:f6:e4:c7:26:52:e7:e0:72:c4:54:b2:5d:35:ae]
            modulus: d6b50bde8bb9e4191b68cca7736ad88f130ec33bbb2a933a0bf452cca411e2ca8b9149f5fcea479afb5200c2de73d2704ec8c3903c78a900814baa0565e53d459c8c2569bb179a088e1e730a6a7f57c430d36aeedf07887b498a55e90470cca586d4afbc3558558d6a289cbab3acdf4617a6074cfaf800d841167b4143b52379e23fc65e4bdb6535fc9d2068e3cadcd554620b2c5cc8b69b612b12812cfbceba956a6220dcd2e785dd7f683b8667641292851fa4461028ff88ce5e00b08778692f619bfa6b7a7b40e6d692d78f064f7987abbad61f7d9125d7875944301b3ffe81972abf13456f1f133fa1de3ef56f55cdf6dfcfb50f86e1cb0baa46e11b17a1
    public exponent: 10001

] 
2022-08-13 04:48:31.686  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:48:31.689 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:48:31.692 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-13 04:48:31.693 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:48:31.693  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-13 04:48:31.694  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:48:31.695  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:48:31.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:48:31.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:48:31.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:48:31.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:48:31.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:48:31.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:48:31.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:48:31.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:48:31.928  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:48:31.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:48:31.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:48:31.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:48:31.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:48:31.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:48:31.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:48:31.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:48:31.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:48:31.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:48:31.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:48:31.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:48:31.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:48:31.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:48:31.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:48:31.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:65:b2:9f:3b:19:42:b5:60:0f:6c:91:b1:5c:c6:e6:fb:9e:36:28]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:50:10.780  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:50:10.782 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:50:10.784 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:50:10.785 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:50:10.785  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:50:10.786  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:50:10.786  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:50:10.787 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:50:10.787 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:50:10.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:50:10.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:50:10.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:50:10.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:50:10.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:50:11.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:50:11.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:50:11.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:50:11.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:50:11.026  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:50:11.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:50:11.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:50:11.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:50:11.029 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:50:11.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:50:11.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:50:11.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:50:11.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:50:11.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:50:11.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:50:11.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:50:11.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:c5:a7:8f:c3:03:32:db:6d:56:5d:f3:5c:de:ed:b2:66:7b:7e:91]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:54:17.803  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:54:17.805 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:54:17.806 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:54:17.807 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:54:17.808  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:54:17.808  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:54:17.809  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:54:17.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:54:17.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:54:17.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:54:17.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:54:17.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:54:17.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:54:17.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:54:18.108  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:54:18.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:54:18.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:54:18.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:54:18.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:54:18.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:54:18.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:54:18.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:54:18.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:54:18.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:54:18.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:54:18.114 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:54:18.114 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:54:18.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:54:18.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:54:18.116 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:54:18.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: c82f0eb70294c51ef9c52e36739deea6cd435601dfa25310ac26bbb29ce52886d6718c3183f9301294480ad00e9ce9538953d89b092190247695f4d13529eae633c8660689655852578c5419103570226eb0e3d62a7aa8ada7a005ff3e73c033a6448731e154c9e45c8d8ed25560647b56e9be16fd401eda5fbf8e24cd627b05542b7d960bda60672794c4faccadfa2a25a1bcb0b0a40a95ea652dce93ddfa49548e220b579dfb8638fa1a2f032a67068be3cc6f0f8e6c9997708b33e82270e803d7a3063c8645c08fe706c34295b692d598b09aa2482a21f4447cfbf26d62827b3c5af86ae9b633b9d06ae32fb01c50033b567cb96a0a0650808d3c5d157bad4d510e294a52eeaecc4b02a093437c5d368f5e1ad104a5ed6cb9fcdf55127b673cfbe8113f238123850bc1f2b0fc7665a27b69365072f7fc1998b5b69f388aff7fd9d1dbea0ef390d11fc735d8ee0239bac4a723ee1e0fbd58168968e7c212993f2b8d87d331e79388592fdceeec8bb48149004b4b541874188d4ec451f51eb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:a6:79:c1:48:3a:27:f8:99:dd:47:45:45:02:ba:9e:36:61:c2:f2]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 04:59:25.374  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 04:59:25.376 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 04:59:25.379 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:59:25.381 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 04:59:25.381  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 04:59:25.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 04:59:25.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 04:59:25.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 04:59:25.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 04:59:25.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 04:59:25.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 04:59:25.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:59:25.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 04:59:25.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:59:25.615  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 04:59:25.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 04:59:25.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 04:59:25.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 04:59:25.619  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 04:59:25.619  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 04:59:25.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:59:25.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:59:25.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:59:25.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:59:25.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:59:25.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:59:25.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 04:59:25.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 04:59:25.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 04:59:25.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 04:59:25.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: c82f0eb70294c51ef9c52e36739deea6cd435601dfa25310ac26bbb29ce52886d6718c3183f9301294480ad00e9ce9538953d89b092190247695f4d13529eae633c8660689655852578c5419103570226eb0e3d62a7aa8ada7a005ff3e73c033a6448731e154c9e45c8d8ed25560647b56e9be16fd401eda5fbf8e24cd627b05542b7d960bda60672794c4faccadfa2a25a1bcb0b0a40a95ea652dce93ddfa49548e220b579dfb8638fa1a2f032a67068be3cc6f0f8e6c9997708b33e82270e803d7a3063c8645c08fe706c34295b692d598b09aa2482a21f4447cfbf26d62827b3c5af86ae9b633b9d06ae32fb01c50033b567cb96a0a0650808d3c5d157bad4d510e294a52eeaecc4b02a093437c5d368f5e1ad104a5ed6cb9fcdf55127b673cfbe8113f238123850bc1f2b0fc7665a27b69365072f7fc1998b5b69f388aff7fd9d1dbea0ef390d11fc735d8ee0239bac4a723ee1e0fbd58168968e7c212993f2b8d87d331e79388592fdceeec8bb48149004b4b541874188d4ec451f51eb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:26:db:28:c6:be:dd:9f:6d:99:89:ca:9f:1f:c3:fb:6b:75:61:83]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 05:04:31.858  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 05:04:31.862 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 05:04:31.865 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 05:04:31.867 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 05:04:31.878  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 05:04:31.880  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 05:04:31.880  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 05:04:31.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 05:04:31.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 05:04:31.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 05:04:31.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 05:04:31.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:04:31.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:04:31.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:04:32.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 05:04:32.147  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 05:04:32.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 05:04:32.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:04:32.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 05:04:32.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 05:04:32.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:04:32.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:04:32.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:04:32.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:04:32.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:04:32.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:04:32.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:04:32.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:04:32.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:04:32.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 05:04:32.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:f5:76:52:ee:37:e2:da:68:8a:a5:da:80:34:cc:e7:c1:27:e1:b6]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 05:08:12.438  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 05:08:12.440 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 05:08:12.441 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-13 05:08:12.442 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 05:08:12.443  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-13 05:08:12.447  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 05:08:12.448  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 05:08:12.448 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 05:08:12.449 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 05:08:12.449 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 05:08:12.456 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 05:08:12.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:08:12.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:08:12.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:08:12.674  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 05:08:12.676  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 05:08:12.676 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 05:08:12.676 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:08:12.680  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 05:08:12.681  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 05:08:12.681 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:08:12.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:08:12.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:08:12.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:08:12.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:08:12.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:08:12.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:08:12.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:08:12.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:08:12.686 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 05:08:12.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:cf:3c:44:a4:53:7f:89:50:33:9d:d4:31:0c:11:ee:84:2a:92:01]
            modulus: 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
    public exponent: 10001

] 
2022-08-13 05:08:48.865  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 05:08:48.866 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 05:08:48.885 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-13 05:08:48.886 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 05:08:48.887  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-13 05:08:48.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 05:08:48.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 05:08:48.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 05:08:48.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 05:08:48.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 05:08:48.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 05:08:48.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:08:48.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:08:48.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:08:49.077  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 05:08:49.077  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 05:08:49.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 05:08:49.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:08:49.080  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 05:08:49.080  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 05:08:49.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:08:49.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:08:49.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:08:49.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:08:49.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:08:49.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:08:49.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:08:49.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:08:49.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:08:49.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 05:08:49.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: c82f0eb70294c51ef9c52e36739deea6cd435601dfa25310ac26bbb29ce52886d6718c3183f9301294480ad00e9ce9538953d89b092190247695f4d13529eae633c8660689655852578c5419103570226eb0e3d62a7aa8ada7a005ff3e73c033a6448731e154c9e45c8d8ed25560647b56e9be16fd401eda5fbf8e24cd627b05542b7d960bda60672794c4faccadfa2a25a1bcb0b0a40a95ea652dce93ddfa49548e220b579dfb8638fa1a2f032a67068be3cc6f0f8e6c9997708b33e82270e803d7a3063c8645c08fe706c34295b692d598b09aa2482a21f4447cfbf26d62827b3c5af86ae9b633b9d06ae32fb01c50033b567cb96a0a0650808d3c5d157bad4d510e294a52eeaecc4b02a093437c5d368f5e1ad104a5ed6cb9fcdf55127b673cfbe8113f238123850bc1f2b0fc7665a27b69365072f7fc1998b5b69f388aff7fd9d1dbea0ef390d11fc735d8ee0239bac4a723ee1e0fbd58168968e7c212993f2b8d87d331e79388592fdceeec8bb48149004b4b541874188d4ec451f51eb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:95:77:42:c1:d5:95:58:dd:04:12:64:16:0a:8d:87:6b:39:af:b2]
            modulus: b7f1139258fa175a4fa1e579bc0df811d8a6740ce9c87b7130861e3d697565bce8586c10fdab7c16fe8f827fafc0469c87abc876f6fb0935c2834eba0498c0a320bdcb30d2fbe7a22ac83787c514e88eeb82c0bfef21bb1c189897399af43691553ca44ac3836f2414a085a5157958e248d4dd76c4449c865ad7e7a7a156431327877582bbd8e3df317fad72844d04f03bd941a5239d75aad0df569371fb7362208261f730c2ec50405876063b7e981ce1c895ae229cd79327690473748be17ddd3cac8d2c5e42c3d64e8b3dab90f5e7f7c72ad46def36f32180c435101b9564aae7cb71032b52794e40fae20b83b9188a1bb5131c859560d9d3707c5f827a11
    public exponent: 10001

] 
2022-08-13 05:09:08.409  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-13 05:09:08.410 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-13 05:09:08.411 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 05:09:08.412 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-13 05:09:08.412  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-13 05:09:08.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-13 05:09:08.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-13 05:09:08.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-13 05:09:08.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-13 05:09:08.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-13 05:09:08.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-13 05:09:08.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:09:08.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-13 05:09:08.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:09:08.614  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-13 05:09:08.614  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-13 05:09:08.615 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-13 05:09:08.615 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-13 05:09:08.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-13 05:09:08.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-13 05:09:08.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:09:08.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:09:08.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:09:08.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:09:08.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:09:08.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:09:08.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-13 05:09:08.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-13 05:09:08.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-13 05:09:08.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-13 05:09:08.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 56956089389491771562593486815235634368540864042
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Aug 13 03:06:40 UTC 2022
           Final Date: Thu Aug 12 03:06:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:22:c6:e8:00:94:91:40:a5:07:ea:1d:5b:ff:91:0b:ae:ea:1f:17]
            modulus: c82f0eb70294c51ef9c52e36739deea6cd435601dfa25310ac26bbb29ce52886d6718c3183f9301294480ad00e9ce9538953d89b092190247695f4d13529eae633c8660689655852578c5419103570226eb0e3d62a7aa8ada7a005ff3e73c033a6448731e154c9e45c8d8ed25560647b56e9be16fd401eda5fbf8e24cd627b05542b7d960bda60672794c4faccadfa2a25a1bcb0b0a40a95ea652dce93ddfa49548e220b579dfb8638fa1a2f032a67068be3cc6f0f8e6c9997708b33e82270e803d7a3063c8645c08fe706c34295b692d598b09aa2482a21f4447cfbf26d62827b3c5af86ae9b633b9d06ae32fb01c50033b567cb96a0a0650808d3c5d157bad4d510e294a52eeaecc4b02a093437c5d368f5e1ad104a5ed6cb9fcdf55127b673cfbe8113f238123850bc1f2b0fc7665a27b69365072f7fc1998b5b69f388aff7fd9d1dbea0ef390d11fc735d8ee0239bac4a723ee1e0fbd58168968e7c212993f2b8d87d331e79388592fdceeec8bb48149004b4b541874188d4ec451f51eb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7eb4d33ae22e73cf073bc534d2d2b63bbe985a8e
                       d23add5a02610a94d914a687bf8f6809289d5541
                       fe3d159c2b175b12c8d476781a268fa8bd42e372
                       101462831d5f9a283ec35f9f1928cd41fc188ba2
                       27f3c355103b0341480bb502ea5c7c6dd885720b
                       fb576dec72c52de794a0ba8a8bc7c40d06ad4724
                       660decc72eb468e2d3edf5108061dbf9368d99c5
                       0227e64c7c3e326edf72dc8c027eed67d6cab110
                       877e184bd833192d70a1899fb22ecd779382a5da
                       a998468ad72390f27b20a1ca7665000f46ef4787
                       279855bad78d86f05000ef407ba659c84e4e7db9
                       78d9c4d0ca540f4b0a7f9c32c891029042e8c554
                       7229521a9c327751a031fb54ef6196a15b378629
                       e1413693027e45adb1cfbe4834c10b1c78a28c0e
                       4a2f67f45029663e4b32f7a99516c661a3c58928
                       5e6916b1c50a41c192bb777a0c336c6619e7477f
                       46e6dbf193c08837d3d59fd4767fdba1e692f3e0
                       85f706ee07a1a01c469a6f277a60359c5390009c
                       41903759c108d8d4409e959cd6a8e0c6c6d99e47
                       a2f4f4ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:6c:00:de:49:f9:a8:4d:43:32:3a:e1:46:fd:79:4d:1b:44:47:40]
            modulus: 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
    public exponent: 10001

]