Results

By type

          2022-04-18 05:07:17,650 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-18 05:07:18,638 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-18 05:07:19.497  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 18, 2022 5:07:21 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 18, 2022 5:07:21 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 18, 2022 5:07:21 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 18, 2022 5:07:21 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-18 05:07:22.038 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-18 05:07:22.422  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-18 05:07:22.614  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-18 05:07:23.396 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-18 05:07:23.399 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-18 05:07:23.401 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-18 05:07:23.405 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-18 05:07:23.448 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-04-18 05:07:23.451 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-18 05:07:23.585 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-18 05:07:24.310 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 18, 2022 5:07:24 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-18 05:07:25.210  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.594 seconds (JVM running for 10.389)
Apr 18, 2022 5:07:45 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-18 05:08:17.830  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 05:08:17.838 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 05:08:17.882 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-18 05:08:17.888 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 05:08:17.905  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-18 05:08:17.908  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 05:08:17.909  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 05:08:17.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 05:08:17.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 05:08:17.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 05:08:17.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 05:08:17.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 05:08:17.973 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 05:08:17.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 05:08:17.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 05:08:17.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 05:08:18.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 05:08:18.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 05:08:18.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 05:08:18.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 05:08:18.768  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 05:08:18.769  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 05:08:18.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 05:08:18.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 05:08:18.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 05:08:18.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 05:08:18.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 05:08:18.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 05:08:18.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 05:08:18.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 05:08:18.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 05:08:18.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 05:08:18.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: a53f19f02504546ed66fb314c3a5edf7f86d40b8d9382a2607ef622e7bbfe579c28cd90da081ccf5039bc573fafcb71a90766fc04ee62395438084d30bbe3622db0a1934d6a65a3c8ee6fca0b108b74901ccfa7117b7a01363924e05524d0c43b9780a68b739309c42a36e838a5bcaae336e02cbd1fef20aa36244518ba2e1df920afa38b7792492d650d32704632246f0979727710d7bea9706384dc24cf679898d2bf807f5439fcedca6e6933f61f315a3a8b4ae5587cbf900831a2feb6000498932e705373e4c14dfe62327df57c77664f34f463cd0e491815b9394da6d4d8e7422246a06420ab2e73c10924fa7ac970f87397b7b96d863bb5ca1942c0d8c92b1e963413f110fae5c706397ab5e2b0e421c646188481c5a9695c02b76720504513079d20640c78a21dec163cc91f5a9d665b7373cc6dfee53adf46d2890c44e441cc590c0553d3d3dd408bcdaa19e8e3899180348e39ec0afcbb866c79ebe139d99e74da907e97385a6dc1ec60912974305c763204c3805bfa4eae24f2d43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:b8:a6:f0:1b:97:8d:aa:c4:76:9b:e1:39:34:54:c5:16:49:20:73]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:18:16.608  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:18:16.611 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:18:16.615 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-18 07:18:16.617 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:18:16.618  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-18 07:18:16.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:18:16.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:18:16.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:18:16.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:18:16.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:18:16.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:18:16.637 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:18:16.637 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:18:16.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:18:16.953  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:18:16.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:18:16.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:18:16.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:18:16.959  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:18:16.959  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:18:16.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:18:16.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:18:16.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:18:16.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:18:16.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:18:16.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:18:16.965 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:18:16.965 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:18:16.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:18:16.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:18:16.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:bb:93:7e:fe:de:0e:35:17:30:41:d9:ba:91:1a:03:7b:33:61:f8]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:18:24.517  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:18:24.520 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:18:24.522 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:18:24.524 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:18:24.524  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:18:24.526  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:18:24.527  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:18:24.527 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:18:24.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:18:24.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:18:24.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:18:24.541 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:18:24.542 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:18:24.542 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:18:24.795  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:18:24.796  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:18:24.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:18:24.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:18:24.800  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:18:24.800  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:18:24.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:18:24.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:18:24.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:18:24.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:18:24.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:18:24.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:18:24.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:18:24.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:18:24.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:18:24.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:18:24.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:cc:0e:58:00:07:fc:e2:c3:02:27:d0:04:14:97:e7:24:99:23:f4]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:21:17.599  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:21:17.602 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:21:17.604 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:21:17.605 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:21:17.605  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:21:17.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:21:17.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:21:17.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:21:17.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:21:17.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:21:17.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:21:17.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:21:17.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:21:17.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:21:18.064  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:21:18.065  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:21:18.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:21:18.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:21:18.068  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:21:18.069  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:21:18.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:21:18.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:21:18.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:21:18.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:21:18.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:21:18.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:21:18.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:21:18.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:21:18.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:21:18.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:21:18.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:eb:de:3e:7d:01:50:f1:ba:de:0a:5d:54:01:df:8a:59:3a:0e:7b]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:23:05.198  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:23:05.200 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:23:05.201 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-18 07:23:05.202 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:23:05.203  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-18 07:23:05.204  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:23:05.204  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:23:05.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:23:05.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:23:05.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:23:05.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:23:05.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:23:05.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:23:05.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:23:05.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:23:05.459  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:23:05.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:23:05.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:23:05.462  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:23:05.462  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:23:05.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:23:05.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:23:05.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:23:05.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:23:05.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:23:05.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:23:05.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:23:05.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:23:05.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:23:05.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:23:05.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:23:d7:e9:6a:37:c8:7c:ec:5a:83:5e:4d:8b:f0:22:a7:95:52:7a]
            modulus: 91f549113ee34060da8a9d80d729f8c503ce8feaa40a08ad60281ce9ad913baba7bbe8a03f4e7a3e77cf6e206ce5fd732fc957f475412568ced3113cec7bb944da5625e15ddfcd39a323ae44da976488c5e3ae32a840e93e181bc6833100d7eb8814dfa28d34cd5e115920508c15737dacd54dfbddfe4a741dc01f30965305c47fc695a54a03d98e5e89e3d3962cbc8564d25e2fecc44349e96ec1f41e4afc06a895d9934c1bcec3b9a38667b1e86d0fb1d0df56375ea646882f13cf1c12e584e0f0118f68f15a4e2f70cd71c77823c33fd9b57a3d95e8fbd8c31c01703d09b64a3bfc2d6781370e2ae734a326b895bf3814231e340ce3a5d91492eb41dc1ad7
    public exponent: 10001

] 
2022-04-18 07:24:18.177  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:24:18.182 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:24:18.185 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-18 07:24:18.186 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:24:18.186  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-18 07:24:18.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:24:18.188  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:24:18.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:24:18.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:24:18.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:24:18.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:24:18.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:24:18.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:24:18.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:24:18.411  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:24:18.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:24:18.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:24:18.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:24:18.419  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:24:18.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:24:18.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:18.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:18.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:18.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:18.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:18.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:18.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:18.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:18.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:18.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:24:18.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6b:77:a7:d2:e7:34:04:f8:e8:bc:be:c0:aa:c8:92:5a:65:e8:5b:8e]
            modulus: ef6bd18cbc55cd2adb67071d1b143e279447b56ee906624be3ebf5ccaddec5a4d4428a273b2db365a2d1ca22365ab9c3966b82778f0e6bb2d551a6aa72faf777ab23694e8e2d5fcae07a274c792ea4edd972a87a127c1e3ee19305de633589e113940295b88469b5424a1dbb97e99bdf1773265b4eebd9d6f11b534d2c6eab53a5c882f6917d60992d076193011f35cd4fe2ca5cdbc41cadde08b4219a2d499f6804b6841105d10b027aa410b063f3b1a210c7a3a55aa5a9717b577dd262ca3de0be5e84566a18f54990c1f7d0630e1915b22465623e5b144ecd2a3a1bb980c40a13dac372ef44c50f7efa92d7f4ca6a106d36934f4c97849697f130a9fc7af7
    public exponent: 10001

] 
2022-04-18 07:24:18.545  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:24:18.546 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:24:18.548 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-18 07:24:18.548 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:24:18.549  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-18 07:24:18.549  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:24:18.550  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:24:18.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:24:18.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:24:18.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:24:18.563 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:24:18.565 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:24:18.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:24:18.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:24:18.715  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:24:18.716  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:24:18.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:24:18.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:24:18.718  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:24:18.718  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:24:18.719 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:18.719 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:18.720 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:18.720 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:18.721 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:18.721 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:18.722 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:18.722 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:18.723 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:18.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:24:18.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:5c:fb:84:73:ff:f6:14:41:4b:8c:76:02:d9:e6:ee:0a:d2:71:ae]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:24:33.188  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:24:33.189 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:24:33.191 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-18 07:24:33.192 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:24:33.193  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-18 07:24:33.194  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:24:33.194  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:24:33.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:24:33.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:24:33.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:24:33.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:24:33.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:24:33.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:24:33.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:24:33.541  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:24:33.542  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:24:33.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:24:33.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:24:33.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:24:33.546  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:24:33.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:33.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:33.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:33.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:33.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:33.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:33.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:24:33.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:24:33.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:24:33.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:24:33.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: a53f19f02504546ed66fb314c3a5edf7f86d40b8d9382a2607ef622e7bbfe579c28cd90da081ccf5039bc573fafcb71a90766fc04ee62395438084d30bbe3622db0a1934d6a65a3c8ee6fca0b108b74901ccfa7117b7a01363924e05524d0c43b9780a68b739309c42a36e838a5bcaae336e02cbd1fef20aa36244518ba2e1df920afa38b7792492d650d32704632246f0979727710d7bea9706384dc24cf679898d2bf807f5439fcedca6e6933f61f315a3a8b4ae5587cbf900831a2feb6000498932e705373e4c14dfe62327df57c77664f34f463cd0e491815b9394da6d4d8e7422246a06420ab2e73c10924fa7ac970f87397b7b96d863bb5ca1942c0d8c92b1e963413f110fae5c706397ab5e2b0e421c646188481c5a9695c02b76720504513079d20640c78a21dec163cc91f5a9d665b7373cc6dfee53adf46d2890c44e441cc590c0553d3d3dd408bcdaa19e8e3899180348e39ec0afcbb866c79ebe139d99e74da907e97385a6dc1ec60912974305c763204c3805bfa4eae24f2d43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:2d:16:26:c3:4c:c8:11:db:d9:6b:ae:a1:32:52:f3:47:51:49:03]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:26:45.133  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:26:45.135 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:26:45.136 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:26:45.137 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:26:45.137  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:26:45.138  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:26:45.138  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:26:45.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:26:45.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:26:45.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:26:45.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:26:45.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:26:45.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:26:45.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:26:45.505  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:26:45.506  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:26:45.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:26:45.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:26:45.508  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:26:45.508  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:26:45.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:26:45.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:26:45.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:26:45.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:26:45.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:26:45.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:26:45.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:26:45.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:26:45.512 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:26:45.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:26:45.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:be:9c:26:79:30:29:b0:d2:1f:77:d0:84:a2:23:56:b4:7b:13:b8]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:30:25.439  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:30:25.442 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:30:25.444 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:30:25.445 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:30:25.446  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:30:25.446  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:30:25.447  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:30:25.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:30:25.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:30:25.448 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:30:25.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:30:25.456 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:30:25.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:30:25.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:30:25.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:30:25.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:30:25.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:30:25.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:30:25.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:30:25.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:30:25.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:30:25.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:30:25.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:30:25.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:30:25.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:30:25.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:30:25.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:30:25.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:30:25.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:30:25.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:30:25.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: a53f19f02504546ed66fb314c3a5edf7f86d40b8d9382a2607ef622e7bbfe579c28cd90da081ccf5039bc573fafcb71a90766fc04ee62395438084d30bbe3622db0a1934d6a65a3c8ee6fca0b108b74901ccfa7117b7a01363924e05524d0c43b9780a68b739309c42a36e838a5bcaae336e02cbd1fef20aa36244518ba2e1df920afa38b7792492d650d32704632246f0979727710d7bea9706384dc24cf679898d2bf807f5439fcedca6e6933f61f315a3a8b4ae5587cbf900831a2feb6000498932e705373e4c14dfe62327df57c77664f34f463cd0e491815b9394da6d4d8e7422246a06420ab2e73c10924fa7ac970f87397b7b96d863bb5ca1942c0d8c92b1e963413f110fae5c706397ab5e2b0e421c646188481c5a9695c02b76720504513079d20640c78a21dec163cc91f5a9d665b7373cc6dfee53adf46d2890c44e441cc590c0553d3d3dd408bcdaa19e8e3899180348e39ec0afcbb866c79ebe139d99e74da907e97385a6dc1ec60912974305c763204c3805bfa4eae24f2d43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:37:3d:4d:0b:f8:2f:10:83:b9:4a:5a:e9:99:8e:8a:6b:ee:db:43]
            modulus: cd6ad9fffbe3673f3a3a587cacf2e6a4d079d2c760c1d349d2e8e230d0530fa7fa307ccdc13ebebee6b414e672958bf8e1cce55082197e1aef0637095255f48365319f96bd2c86ef02649346e535a527155be62bae04b6a9cb152d806516c8164261549a33acc079b9ac0a80689bbf6630886c416c33e01e4042ec40a9fafbbf41803243b7b5acda2a447e032232cd11e137986ec594214055d41d50e5640adacf76011c8b30e2aa5c6901fadb381f36814116352eb288840cf37e9b435ea99a804cf290f4ca67de88e4dd97e9c79205e99c27ab1dc3b2af37f15a18cb37cc25c91c480bbca86e265f2516cbdb4d516d54dc033a2428fe8414ef0f7d1906977d
    public exponent: 10001

] 
2022-04-18 07:35:29.268  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:35:29.270 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:35:29.272 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:35:29.273 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:35:29.274  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:35:29.274  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:35:29.275  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:35:29.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:35:29.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:35:29.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:35:29.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:35:29.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:35:29.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:35:29.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:35:29.543  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:35:29.545  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:35:29.546 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:35:29.546 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:35:29.549  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:35:29.550  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:35:29.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:35:29.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:35:29.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:35:29.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:35:29.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:35:29.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:35:29.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:35:29.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:35:29.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:35:29.557 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:35:29.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:2b:f2:7f:c8:58:88:c6:7d:a1:57:af:9f:35:ed:74:ab:d2:53:4e]
            modulus: bf2dd4404741b613805d571b12f8b88ef215b5b2b47b526e3654f2fdf3ece62183cab24a57c293004a90cd81b41412726c61c61b55af77dadf39faae3e40300c458242516cc2d0ed73e91260a2fbbc4d19b8d9bb8de775eab2167fa4901027a741dcd14df3eefb7ad74cbdf3e90e657491a374647415f3574b5910461e7368c39f13ba72accd320fa4d3f68cfb4b2d54c9ced14cefb75c77cdee45d117da7b10f271a1acd488c0e2489e3913ebc64014c4bfeec5d0ecb1ba84b465200678051a3d49c5b23aa9384bf982f345389a72285095768a50c3bcf6fd37253a5f85b3dbb499a3152dcdedc0f7e507424dfcc24a4ce41a59677fe121a7f66e6161f944e7
    public exponent: 10001

] 
2022-04-18 07:39:27.168  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:39:27.170 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:39:27.172 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:39:27.173 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:39:27.173  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:39:27.174  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:39:27.175  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:39:27.175 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:39:27.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:39:27.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:39:27.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:39:27.183 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:39:27.183 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:39:27.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:39:27.447  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:39:27.448  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:39:27.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:39:27.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:39:27.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:39:27.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:39:27.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:39:27.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:39:27.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:39:27.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:39:27.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:39:27.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:39:27.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:39:27.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:39:27.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:39:27.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:39:27.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: a53f19f02504546ed66fb314c3a5edf7f86d40b8d9382a2607ef622e7bbfe579c28cd90da081ccf5039bc573fafcb71a90766fc04ee62395438084d30bbe3622db0a1934d6a65a3c8ee6fca0b108b74901ccfa7117b7a01363924e05524d0c43b9780a68b739309c42a36e838a5bcaae336e02cbd1fef20aa36244518ba2e1df920afa38b7792492d650d32704632246f0979727710d7bea9706384dc24cf679898d2bf807f5439fcedca6e6933f61f315a3a8b4ae5587cbf900831a2feb6000498932e705373e4c14dfe62327df57c77664f34f463cd0e491815b9394da6d4d8e7422246a06420ab2e73c10924fa7ac970f87397b7b96d863bb5ca1942c0d8c92b1e963413f110fae5c706397ab5e2b0e421c646188481c5a9695c02b76720504513079d20640c78a21dec163cc91f5a9d665b7373cc6dfee53adf46d2890c44e441cc590c0553d3d3dd408bcdaa19e8e3899180348e39ec0afcbb866c79ebe139d99e74da907e97385a6dc1ec60912974305c763204c3805bfa4eae24f2d43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:19:6d:f2:b3:41:9d:52:92:3f:a6:16:03:3f:53:02:30:e1:07:a4]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:43:56.058  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:43:56.060 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:43:56.061 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:43:56.062 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:43:56.062  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:43:56.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:43:56.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:43:56.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:43:56.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:43:56.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:43:56.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:43:56.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:43:56.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:43:56.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:43:56.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:43:56.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:43:56.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:43:56.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:43:56.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:43:56.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:43:56.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:43:56.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:43:56.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:43:56.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:43:56.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:43:56.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:43:56.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:43:56.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:43:56.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:43:56.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:43:56.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:2d:9d:87:fa:41:f9:07:a5:a0:2d:fb:f4:d4:5e:4b:7d:a3:54:5a]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:48:48.462  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:48:48.465 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:48:48.467 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:48:48.468 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:48:48.469  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:48:48.470  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:48:48.470  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:48:48.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:48:48.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:48:48.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:48:48.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:48:48.478 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:48:48.478 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:48:48.478 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:48:48.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:48:48.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:48:48.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:48:48.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:48:48.703  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:48:48.704  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:48:48.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:48:48.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:48:48.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:48:48.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:48:48.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:48:48.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:48:48.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:48:48.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:48:48.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:48:48.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:48:48.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:b1:6f:33:7b:8b:c4:be:15:ae:27:98:ca:c7:e9:21:8c:c2:02:e9]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:53:24.702  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:53:24.704 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:53:24.707 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:53:24.707 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:53:24.708  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:53:24.708  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:53:24.709  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:53:24.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:53:24.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:53:24.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:53:24.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:53:24.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:53:24.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:53:24.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:53:24.992  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:53:24.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:53:24.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:53:24.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:53:24.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:53:24.996  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:53:24.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:53:24.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:53:24.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:53:24.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:53:24.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:53:24.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:53:25.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:53:25.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:53:25.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:53:25.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:53:25.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:b3:9b:90:69:d6:e2:55:ef:b8:10:a6:f6:ae:c8:4e:fe:d5:29:e4]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 07:59:37.738  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 07:59:37.742 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 07:59:37.746 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:59:37.747 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 07:59:37.748  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 07:59:37.749  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 07:59:37.749  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 07:59:37.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 07:59:37.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 07:59:37.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 07:59:37.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 07:59:37.759 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:59:37.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 07:59:37.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:59:37.956  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 07:59:37.956  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 07:59:37.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 07:59:37.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 07:59:37.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 07:59:37.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 07:59:37.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:59:37.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:59:37.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:59:37.961 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:59:37.961 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:59:37.961 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:59:37.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 07:59:37.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 07:59:37.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 07:59:37.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 07:59:37.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:7c:d6:f6:dc:ac:97:b9:f7:6c:74:5a:d1:f5:52:9e:6e:ba:50:61]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 08:04:00.140  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 08:04:00.143 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 08:04:00.145 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 08:04:00.146 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 08:04:00.147  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 08:04:00.147  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 08:04:00.148  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 08:04:00.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 08:04:00.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 08:04:00.149 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 08:04:00.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 08:04:00.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 08:04:00.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 08:04:00.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 08:04:00.351  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 08:04:00.352  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 08:04:00.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 08:04:00.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 08:04:00.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 08:04:00.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 08:04:00.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:04:00.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:04:00.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:04:00.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:04:00.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:04:00.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:04:00.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:04:00.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:04:00.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:04:00.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 08:04:00.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: a53f19f02504546ed66fb314c3a5edf7f86d40b8d9382a2607ef622e7bbfe579c28cd90da081ccf5039bc573fafcb71a90766fc04ee62395438084d30bbe3622db0a1934d6a65a3c8ee6fca0b108b74901ccfa7117b7a01363924e05524d0c43b9780a68b739309c42a36e838a5bcaae336e02cbd1fef20aa36244518ba2e1df920afa38b7792492d650d32704632246f0979727710d7bea9706384dc24cf679898d2bf807f5439fcedca6e6933f61f315a3a8b4ae5587cbf900831a2feb6000498932e705373e4c14dfe62327df57c77664f34f463cd0e491815b9394da6d4d8e7422246a06420ab2e73c10924fa7ac970f87397b7b96d863bb5ca1942c0d8c92b1e963413f110fae5c706397ab5e2b0e421c646188481c5a9695c02b76720504513079d20640c78a21dec163cc91f5a9d665b7373cc6dfee53adf46d2890c44e441cc590c0553d3d3dd408bcdaa19e8e3899180348e39ec0afcbb866c79ebe139d99e74da907e97385a6dc1ec60912974305c763204c3805bfa4eae24f2d43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:1f:eb:15:ab:8b:4b:00:82:15:cc:19:38:63:52:c8:f6:51:f8:13]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 08:12:52.919  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 08:12:52.922 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 08:12:52.925 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 08:12:52.926 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 08:12:52.927  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 08:12:52.927  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 08:12:52.928  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 08:12:52.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 08:12:52.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 08:12:52.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 08:12:52.935 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 08:12:52.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 08:12:52.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 08:12:52.937 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 08:12:53.238  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 08:12:53.239  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 08:12:53.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 08:12:53.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 08:12:53.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 08:12:53.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 08:12:53.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:12:53.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:12:53.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:12:53.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:12:53.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:12:53.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:12:53.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:12:53.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:12:53.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:12:53.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 08:12:53.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:fe:07:50:71:c9:ff:59:c0:73:aa:0f:e0:42:24:a1:f2:3b:7f:62]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 08:17:18.835  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 08:17:18.837 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 08:17:18.839 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 08:17:18.839 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 08:17:18.840  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 08:17:18.840  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 08:17:18.840  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 08:17:18.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 08:17:18.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 08:17:18.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 08:17:18.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 08:17:18.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 08:17:18.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 08:17:18.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 08:17:19.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 08:17:19.067  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 08:17:19.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 08:17:19.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 08:17:19.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 08:17:19.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 08:17:19.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:17:19.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:17:19.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:17:19.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:17:19.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:17:19.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:17:19.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 08:17:19.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 08:17:19.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 08:17:19.077 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 08:17:19.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 262249202390613274439918779978129742577958121122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 18 05:03:32 UTC 2022
           Final Date: Sat Apr 17 05:03:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:50:bc:dd:05:d0:4f:0f:00:9b:ab:9e:e1:1a:21:58:f2:2b:12:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 993fd2e39a285b7f015700ba24441d57d76bfdec
                       33d7df56dd7cd2365d39b6b7379d028f67599ed3
                       b9accd8a2273e77db52ce4cfe5bff70b422606cc
                       d018ce444c0eba0de694f2c8bad58eb8b2297e90
                       b35fc3963c2b3027b2199340617dff6d3b80d1eb
                       0e9289fc1806da102ab20f185ed24101c63fd64f
                       98fcac42319f60305b09d1e57e91a5e2fc9013e3
                       c63c498b6c4f54802d8a13d20e2b7f3b7d9677e3
                       bdea5e2504d8a46d3f722e8cc59e5f1814c892be
                       32dc91e0a2cc84c92d24f8c2859f362d11d82f99
                       ae92737cf50611a3e1ce3c014c068b75f881a5c9
                       d52161afcd92cbe03e5c353c665b4faeb329dfcf
                       57ff0fa8426c7304524f26f148d1f736d236ae6b
                       ace34a5e3b17965aebbeb5e3e6ca6848fdfef745
                       676ae5daac6b5fbd95257c97181347ef46c1819a
                       492dfe4392fea2dce63cba6f6e11b940a6d67c22
                       4a30692f9b715888d26c3cfa5ca8cff1e36f9f3c
                       69dfa5a9e05476c9313bd96c150538606decc26f
                       11c28a552e06eb292f1171c12768c1bbc7abb09b
                       523ecb72
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:42:4c:e5:6f:de:6a:6c:eb:3b:6c:0d:6e:ed:c5:52:b1:ff:10:f1]
            modulus: be13e654f658849f86fd9cf7ef4b74c105b9f37749e391b93001d5854b476058f14da523b9f0eed3a7b3eafa7e46b3e10da339464720d11fdbb296ab56cd3466370a318f4adb7819afa44e359a56750c39d023c506dd53ef54914dfc00d720c1451e8b3430d6275b8c2ecdd0d413628f951650ad040a3e4f0ad6386fc8153ab075d1ed82d80d3b26dca9eee06779962a006932c22d225de95d5cd55d2769b6881f2a438c39e7e4cc3aacd9b3c2a75701abfdbdab08163b0922ee2d3abfd5e4dd00c4490fcef51a9bb3d43e0aec31f94ccfc06c34ebbbd189d2662f4a92c246260de551c552623312d0c491271ed07e4c2e8cd16f0234ab469cbfaed1a93123ab
    public exponent: 10001

]