Results

By type

          2022-08-31 03:29:24,388 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-31 03:29:25,465 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-31 03:29:26.262  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 31, 2022 3:29:28 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 31, 2022 3:29:28 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 31, 2022 3:29:28 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 31, 2022 3:29:28 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-31 03:29:28.906 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-31 03:29:29.198  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-31 03:29:29.383  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-31 03:29:30.203 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-31 03:29:30.207 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-08-31 03:29:30.210 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-31 03:29:30.214 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-31 03:29:30.258 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-08-31 03:29:30.263 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-08-31 03:29:30.396 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-31 03:29:30.993 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 31, 2022 3:29:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-31 03:29:31.964  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.702 seconds (JVM running for 10.942)
Aug 31, 2022 3:29:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-31 03:30:14.120  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 03:30:14.127 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 03:30:14.162 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-31 03:30:14.166 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 03:30:14.182  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-31 03:30:14.184  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 03:30:14.185  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 03:30:14.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 03:30:14.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 03:30:14.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 03:30:14.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 03:30:14.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 03:30:14.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 03:30:14.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 03:30:14.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 03:30:14.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 03:30:15.459 ERROR 1 [nio-8443-exec-8] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error Connect to ejbca:8080 [ejbca/10.233.45.139] failed: Connection refused (Connection refused), while trying to connect CA RA
2022-08-31 03:30:15.462 ERROR 1 [nio-8443-exec-8] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:169)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
	at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
	at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.45.139] failed: Connection refused (Connection refused)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
	at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
	at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:137)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$c63af2b8.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 62 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
	at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
	at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
	at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
	at java.base/java.net.Socket.connect(Unknown Source)
	at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
	... 83 more

2022-08-31 04:30:15.651  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 04:30:15.653 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 04:30:15.656 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-31 04:30:15.657 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 04:30:15.658  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-31 04:30:15.659  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 04:30:15.659  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 04:30:15.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 04:30:15.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 04:30:15.661 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 04:30:15.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 04:30:15.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 04:30:15.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 04:30:15.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 04:30:16.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 04:30:16.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 04:30:16.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 04:30:16.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 04:30:16.323  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 04:30:16.324  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 04:30:16.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 04:30:16.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 04:30:16.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 04:30:16.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 04:30:16.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 04:30:16.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 04:30:16.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 04:30:16.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 04:30:16.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 04:30:16.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 04:30:16.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: a91802bfd71ef3ace4ab93c51d0e62325fc54a3275cdd28ae3213676cd2b07575ab3aa7ba6b7810c1641105db59856302d4e9153b85db61bfe0442c5066235baa2571e6bcfd4fe0763bdf29fdebbbc174436546eddf92f1d070fef17eb892467084dede1f7676399bd6f697fe1bc7a3f1d1dfde89ec5e5aea738efccef294d52c5b7f3b54fe2c7d16baa9ca63b3262d97f6b0bdb7dc63413559868e5bfccb8d0eb4a8b079c7acd1043c391337c96c36249b00831b10476b4970ffbff9fde4c542c9246cf660d12903d41b961af79f4440f12c4956940204891c600d51464eed8260e7ded3e1931c391cc1df87e617e0028be71169e40dfdb21743569a125c2e9a443ba29560c2f327e3950de376ed37c34f29048d128ab88299b029c5c83d4de0eacfa21cfadb8c9eab49c875c0f0dd6b29d0bd91b881e1a7b225bddb3fefb6596d5cba621457405f00d1a3306790e249b5cab864959d6f29a825e02b9c10d2497beb683ca56aa50491077680770a1a66a65f6720efd3e2a87dffa876d0c7621
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:eb:ec:68:8f:6e:9d:b3:88:51:ab:d2:88:5d:f0:dc:b6:57:18:5a]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:18:46.180  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:18:46.183 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:18:46.185 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:18:46.187 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:18:46.187  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:18:46.188  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:18:46.189  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:18:46.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:18:46.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:18:46.191 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:18:46.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:18:46.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:18:46.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:18:46.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:18:47.351  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:18:47.352  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:18:47.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:18:47.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:18:47.357  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:18:47.358  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:18:47.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:18:47.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:18:47.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:18:47.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:18:47.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:18:47.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:18:47.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:18:47.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:18:47.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:18:47.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:18:47.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:58:51:fe:8a:3c:ee:58:a9:51:48:a5:ce:4d:58:c8:1a:d5:59:94]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:23:36.661  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:23:36.663 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:23:36.666 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:23:36.667 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:23:36.667  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:23:36.668  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:23:36.669  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:23:36.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:23:36.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:23:36.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:23:36.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:23:36.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:23:36.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:23:36.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:23:37.299  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:23:37.301  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:23:37.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:23:37.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:23:37.304  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:23:37.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:23:37.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:23:37.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:23:37.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:23:37.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:23:37.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:23:37.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:23:37.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:23:37.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:23:37.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:23:37.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:23:37.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:81:87:ae:eb:fa:ef:c4:c8:69:94:41:40:78:cd:e6:a5:12:77:90]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:25:07.870  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:25:07.871 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:25:07.872 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-31 05:25:07.873 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:25:07.874  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-31 05:25:07.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:25:07.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:25:07.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:25:07.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:25:07.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:25:07.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:25:07.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:25:07.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:25:07.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:25:08.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:25:08.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:25:08.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:25:08.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:25:08.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:25:08.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:25:08.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:25:08.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:25:08.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:25:08.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:25:08.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:25:08.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:25:08.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:25:08.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:25:08.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:25:08.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:25:08.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: a91802bfd71ef3ace4ab93c51d0e62325fc54a3275cdd28ae3213676cd2b07575ab3aa7ba6b7810c1641105db59856302d4e9153b85db61bfe0442c5066235baa2571e6bcfd4fe0763bdf29fdebbbc174436546eddf92f1d070fef17eb892467084dede1f7676399bd6f697fe1bc7a3f1d1dfde89ec5e5aea738efccef294d52c5b7f3b54fe2c7d16baa9ca63b3262d97f6b0bdb7dc63413559868e5bfccb8d0eb4a8b079c7acd1043c391337c96c36249b00831b10476b4970ffbff9fde4c542c9246cf660d12903d41b961af79f4440f12c4956940204891c600d51464eed8260e7ded3e1931c391cc1df87e617e0028be71169e40dfdb21743569a125c2e9a443ba29560c2f327e3950de376ed37c34f29048d128ab88299b029c5c83d4de0eacfa21cfadb8c9eab49c875c0f0dd6b29d0bd91b881e1a7b225bddb3fefb6596d5cba621457405f00d1a3306790e249b5cab864959d6f29a825e02b9c10d2497beb683ca56aa50491077680770a1a66a65f6720efd3e2a87dffa876d0c7621
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:97:52:f8:6f:1a:db:f7:e0:7e:28:ac:bf:d0:f0:6d:70:e6:a1:e3]
            modulus: cb729817ea64863b039f35cd8b6a56c89dc40cb408a4cb8072991735d7d69e21fda675cb8e4a3d1444911db561c6c93979cca42dfe70b034c1579e7b634bf31d2c5351e3326217fe5dd701ea91af489cb8c1c01e1ca6dddf1c1ebcb4a19c275441faf30f7b2093eaafff229af22d87fca36444e56d5fc540c22dc2ab89a0444af091400f29e41597229a592034b7c508f5c077c7619316add6d7975bc5eb7ffb419c9066bd0473a039f53591f537349c1b6042c1b061bd90396f44ebc8780f0d06ea1ae66e3f6b24832db3fc180602529e28c040d3fff4f0f36937f6079849cef8df97c17b2df2d253254b6f621e6548ff541dbe1381954cb161de429cffeb0d
    public exponent: 10001

] 
2022-08-31 05:27:41.076  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:27:41.078 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:27:41.079 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:27:41.080 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:27:41.080  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:27:41.080  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:27:41.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:27:41.081 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:27:41.081 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:27:41.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:27:41.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:27:41.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:27:41.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:27:41.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:27:41.610  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:27:41.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:27:41.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:27:41.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:27:41.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:27:41.614  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:27:41.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:27:41.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:27:41.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:27:41.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:27:41.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:27:41.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:27:41.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:27:41.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:27:41.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:27:41.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:27:41.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:40:e8:41:b4:4c:11:21:68:95:56:44:a8:f6:6b:c5:3d:42:45:67]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:32:43.334  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:32:43.338 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:32:43.341 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-31 05:32:43.342 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:32:43.343  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-31 05:32:43.343  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:32:43.344  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:32:43.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:32:43.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:32:43.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:32:43.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:32:43.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:32:43.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:32:43.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:32:45.423  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:32:45.424  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:32:45.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:32:45.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:32:45.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:32:45.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:32:45.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:32:45.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:32:45.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:32:45.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:32:45.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:32:45.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:32:45.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:32:45.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:32:45.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:32:45.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:32:45.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:0c:4a:62:6d:fd:ea:36:b9:a5:aa:2c:e9:b8:8e:85:f2:d8:d4:6f]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:34:51.049  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:34:51.050 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:34:51.052 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:34:51.053 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:34:51.053  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:34:51.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:34:51.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:34:51.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:34:51.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:34:51.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:34:51.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:34:51.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:34:51.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:34:51.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:34:52.208  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:34:52.209  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:34:52.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:34:52.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:34:52.211  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:34:52.212  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:34:52.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:34:52.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:34:52.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:34:52.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:34:52.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:34:52.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:34:52.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:34:52.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:34:52.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:34:52.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:34:52.221 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:26:e5:6b:49:62:20:f9:8d:41:a0:c3:05:6c:1b:15:62:fa:e2:a8]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:39:46.966  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:39:46.970 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:39:46.974 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:39:46.976 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:39:46.976  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:39:46.977  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:39:46.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:39:46.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:39:46.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:39:46.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:39:46.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:39:46.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:39:46.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:39:46.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:39:47.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:39:47.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:39:47.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:39:47.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:39:47.465  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:39:47.465  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:39:47.466 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:39:47.466 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:39:47.466 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:39:47.467 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:39:47.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:39:47.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:39:47.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:39:47.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:39:47.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:39:47.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:39:47.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:5a:7b:a8:29:36:d8:61:4d:6c:92:0a:4a:21:4d:67:3d:65:1e:17]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:45:52.661  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:45:52.664 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:45:52.667 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:45:52.668 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:45:52.669  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:45:52.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:45:52.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:45:52.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:45:52.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:45:52.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:45:52.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:45:52.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:45:52.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:45:52.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:45:53.249  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:45:53.250  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:45:53.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:45:53.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:45:53.252  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:45:53.253  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:45:53.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:45:53.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:45:53.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:45:53.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:45:53.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:45:53.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:45:53.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:45:53.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:45:53.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:45:53.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:45:53.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:6d:0c:39:ce:6f:11:21:61:3e:2e:9c:e6:ee:09:95:db:45:8a:89]
            modulus: bd4d50d55bf788fffb21bf89fb8ae5ed9e650d53e1fcec1231110fbe07f9a152452b3536305cb3abaa74ecc527ff4ed430551ae086301a432dc3c96343e2dbe43088b86ad31ce2b0b1af1acbc1f80720f8c34f19bd84762deb2de8718878def56a04568dd792d898c7d1a0c522069b35ed0c9f3f8bcd208dba086ccd4afb3982561958239329ad9c27e56689579e20fc6e32777dd11375a56f8a53f93cfa21fd616fd5f5036531813bfb3424b168107f022d7d487788a2a67c0f00bfb0239ad316cd0f6d6aac0ff026f5f8d4e050f6d531409a26bbc80494ff03cb63177e8405d2e644fb7de55fbb9690046fb821cf671f671dc5c59e36ac2475133a111b3def
    public exponent: 10001

] 
2022-08-31 05:51:15.758  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:51:15.761 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:51:15.764 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:51:15.765 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:51:15.765  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:51:15.766  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:51:15.767  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:51:15.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:51:15.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:51:15.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:51:15.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:51:15.774 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:51:15.774 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:51:15.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:51:16.589  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:51:16.590  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:51:16.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:51:16.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:51:16.593  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:51:16.593  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:51:16.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:51:16.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:51:16.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:51:16.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:51:16.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:51:16.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:51:16.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:51:16.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:51:16.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:51:16.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:51:16.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:5e:d7:4d:39:fd:4f:17:90:09:87:d8:2d:25:b8:53:2e:52:57:fe]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 05:57:11.252  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 05:57:11.257 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 05:57:11.261 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:57:11.265 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 05:57:11.265  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 05:57:11.266  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 05:57:11.266  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 05:57:11.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 05:57:11.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 05:57:11.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 05:57:11.276 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 05:57:11.277 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:57:11.277 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 05:57:11.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:57:11.822  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 05:57:11.822  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 05:57:11.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 05:57:11.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 05:57:11.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 05:57:11.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 05:57:11.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:57:11.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:57:11.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:57:11.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:57:11.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:57:11.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:57:11.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 05:57:11.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 05:57:11.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 05:57:11.832 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 05:57:11.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: a91802bfd71ef3ace4ab93c51d0e62325fc54a3275cdd28ae3213676cd2b07575ab3aa7ba6b7810c1641105db59856302d4e9153b85db61bfe0442c5066235baa2571e6bcfd4fe0763bdf29fdebbbc174436546eddf92f1d070fef17eb892467084dede1f7676399bd6f697fe1bc7a3f1d1dfde89ec5e5aea738efccef294d52c5b7f3b54fe2c7d16baa9ca63b3262d97f6b0bdb7dc63413559868e5bfccb8d0eb4a8b079c7acd1043c391337c96c36249b00831b10476b4970ffbff9fde4c542c9246cf660d12903d41b961af79f4440f12c4956940204891c600d51464eed8260e7ded3e1931c391cc1df87e617e0028be71169e40dfdb21743569a125c2e9a443ba29560c2f327e3950de376ed37c34f29048d128ab88299b029c5c83d4de0eacfa21cfadb8c9eab49c875c0f0dd6b29d0bd91b881e1a7b225bddb3fefb6596d5cba621457405f00d1a3306790e249b5cab864959d6f29a825e02b9c10d2497beb683ca56aa50491077680770a1a66a65f6720efd3e2a87dffa876d0c7621
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:f1:af:bd:86:6c:03:36:21:47:34:09:35:da:3c:9f:34:ae:98:53]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:04:24.418  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:04:24.423 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:04:24.427 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:04:24.429 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:04:24.430  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:04:24.431  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:04:24.431  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:04:24.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:04:24.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:04:24.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:04:24.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:04:24.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:04:24.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:04:24.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:04:24.821  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:04:24.821  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:04:24.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:04:24.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:04:24.824  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:04:24.824  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:04:24.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:04:24.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:04:24.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:04:24.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:04:24.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:04:24.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:04:24.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:04:24.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:04:24.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:04:24.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:04:24.833 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:c6:71:bf:cd:83:1f:9f:7b:6e:d4:c3:db:e0:70:6a:de:7b:ce:1a]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:10:02.663  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:10:02.666 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:10:02.669 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:10:02.670 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:10:02.670  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:10:02.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:10:02.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:10:02.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:10:02.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:10:02.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:10:02.678 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:10:02.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:10:02.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:10:02.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:10:03.629  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:10:03.629  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:10:03.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:10:03.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:10:03.633  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:10:03.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:10:03.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:10:03.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:10:03.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:10:03.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:10:03.637 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:10:03.637 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:10:03.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:10:03.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:10:03.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:10:03.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:10:03.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:58:41:a8:84:1c:e6:ce:2b:42:1c:4f:ae:02:1d:44:3c:a5:6c:49]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:19:43.194  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:19:43.199 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:19:43.202 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:19:43.203 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:19:43.204  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:19:43.204  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:19:43.205  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:19:43.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:19:43.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:19:43.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:19:43.214 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:19:43.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:19:43.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:19:43.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:19:44.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:19:44.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:19:44.465 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:19:44.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:19:44.468  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:19:44.468  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:19:44.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:19:44.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:19:44.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:19:44.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:19:44.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:19:44.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:19:44.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:19:44.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:19:44.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:19:44.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:19:44.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:f9:6f:3e:05:2b:53:1d:97:b7:4d:04:c0:da:97:d4:59:23:07:17]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:21:24.193  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:21:24.196 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:21:24.200 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-31 06:21:24.202 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:21:24.202  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-31 06:21:24.203  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:21:24.204  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:21:24.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:21:24.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:21:24.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:21:24.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:21:24.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:21:24.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:21:24.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:21:24.547  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:21:24.547  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:21:24.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:21:24.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:21:24.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:21:24.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:21:24.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:21:24.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:21:24.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:21:24.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:21:24.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:21:24.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:21:24.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:21:24.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:21:24.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:21:24.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:21:24.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:49:75:f7:82:9a:ec:2e:cb:7d:a3:6f:f6:2d:ef:33:29:8a:53:1c]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:25:41.147  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:25:41.148 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:25:41.150 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:25:41.150 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:25:41.151  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:25:41.151  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:25:41.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:25:41.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:25:41.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:25:41.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:25:41.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:25:41.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:25:41.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:25:41.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:25:41.462  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:25:41.463  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:25:41.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:25:41.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:25:41.465  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:25:41.466  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:25:41.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:25:41.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:25:41.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:25:41.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:25:41.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:25:41.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:25:41.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:25:41.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:25:41.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:25:41.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:25:41.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:d5:ce:de:85:c1:6c:83:2e:35:44:e8:c8:85:db:33:d3:af:b0:d3]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:27:58.883  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:27:58.886 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:27:58.889 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-31 06:27:58.890 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:27:58.891  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-31 06:27:58.891  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:27:58.892  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:27:58.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:27:58.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:27:58.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:27:58.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:27:58.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:27:58.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:27:58.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:27:59.321  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:27:59.322  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:27:59.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:27:59.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:27:59.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:27:59.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:27:59.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:27:59.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:27:59.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:27:59.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:27:59.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:27:59.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:27:59.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:27:59.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:27:59.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:27:59.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:27:59.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:6b:07:9e:50:12:fc:24:56:8d:e7:1e:f9:2e:44:93:91:e7:4e:14]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:28:23.555  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:28:23.556 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:28:23.557 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-31 06:28:23.558 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:28:23.558  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-31 06:28:23.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:28:23.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:28:23.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:28:23.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:28:23.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:28:23.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:28:23.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:28:23.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:28:23.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:28:24.259  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:28:24.259  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:28:24.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:28:24.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:28:24.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:28:24.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:28:24.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:28:24.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:28:24.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:28:24.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:28:24.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:28:24.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:28:24.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:28:24.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:28:24.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:28:24.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:28:24.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:67:ef:a1:be:da:91:cd:c8:30:e6:0c:14:75:85:0d:53:29:40:94]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:36:32.098  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:36:32.102 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:36:32.105 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:36:32.106 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:36:32.106  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:36:32.107  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:36:32.107  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:36:32.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:36:32.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:36:32.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:36:32.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:36:32.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:36:32.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:36:32.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:36:32.681  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:36:32.681  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:36:32.682 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:36:32.682 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:36:32.683  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:36:32.684  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:36:32.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:36:32.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:36:32.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:36:32.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:36:32.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:36:32.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:36:32.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:36:32.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:36:32.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:36:32.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:36:32.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:ae:cd:cd:10:0b:0a:a6:b4:e0:b3:de:4f:c3:d2:a4:8c:5b:94:4b]
            modulus: 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
    public exponent: 10001

] 
2022-08-31 06:43:01.674  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-31 06:43:01.679 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-31 06:43:01.686 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:43:01.687 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-31 06:43:01.688  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-31 06:43:01.688  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-31 06:43:01.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-31 06:43:01.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-31 06:43:01.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-31 06:43:01.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-31 06:43:01.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-31 06:43:01.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:43:01.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-31 06:43:01.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:43:02.456  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-31 06:43:02.456  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-31 06:43:02.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-31 06:43:02.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-31 06:43:02.458  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-31 06:43:02.459  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-31 06:43:02.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:43:02.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:43:02.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:43:02.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:43:02.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:43:02.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:43:02.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-31 06:43:02.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-31 06:43:02.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-31 06:43:02.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-31 06:43:02.466 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330334820405270780602851148453841627056504119187
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 31 03:17:59 UTC 2022
           Final Date: Mon Aug 30 03:17:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:da:f8:35:f0:15:fe:be:f1:08:9f:ad:a2:3e:a7:2d:85:2b:54:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 82d7166ca7f246a7ba7a8148f47bfa96a749a9cc
                       62c10d9329eda34b7f782c178f4d0892615b4040
                       fc8880e4a8090b43ce1770d98fd2283d6b786485
                       6f4daf4ceb0e1b42809e89982b093ec76bffda8f
                       ff9786934349ee44e7675aaf1efa6e28ce19333f
                       8fce11b399edc7b1d7c7feb63d64055381029fae
                       95612e84d873f28338a72dc95409dda713ba615f
                       8832111c26929adee838fa4164a1775f5025fb79
                       6252a3cf31d7fba46c5f06d3746bd99ef385a9e1
                       d5b6091536bead622a4c615b7bb1384ddf8c4736
                       1b12b6118f8578080c7dacb45db934fc2b6a5283
                       00288c90b6abbb3fa6702c59f02dbd156e31269c
                       dab99ae5c43fa5312f1cdd63a03cc765076fc7c4
                       6288c116a731ca729228f1a87148b58f4cac55c0
                       f0e42efc26c3c0861405537746da0f90c33a6549
                       147b5ab7c880adb16dc8c61b7d62f447864ec152
                       12daac2c5d157eff1de53ec1c7ef43b77cc28bdc
                       4d407f104b5f2a9a9b81a9af5bb1a9a4dec7b741
                       45f2fb8e9eec7fa28e40c612388148a2f8498767
                       3d4c959f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:c5:61:97:92:16:68:b6:0d:4a:12:81:46:57:15:ce:cc:f3:94:50]
            modulus: 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
    public exponent: 10001

]