Results

By type

          2022-04-24 05:13:51,801 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-24 05:13:52,818 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-24 05:13:53.572  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 24, 2022 5:13:55 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 24, 2022 5:13:55 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 24, 2022 5:13:55 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 24, 2022 5:13:55 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-24 05:13:56.274 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-24 05:13:56.580  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-24 05:13:56.760  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-24 05:13:57.497 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-24 05:13:57.500 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-24 05:13:57.501 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-24 05:13:57.505 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-24 05:13:57.550 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-24 05:13:57.553 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-24 05:13:57.680 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-24 05:13:58.344 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 24, 2022 5:13:59 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-24 05:13:59.265  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.285 seconds (JVM running for 10.113)
Apr 24, 2022 5:14:25 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-24 05:14:43.398  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 05:14:43.406 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 05:14:43.442 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-24 05:14:43.446 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 05:14:43.464  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-24 05:14:43.467  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 05:14:43.467  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 05:14:43.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 05:14:43.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 05:14:43.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 05:14:43.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 05:14:43.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 05:14:43.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 05:14:43.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 05:14:43.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 05:14:43.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 05:14:44.495  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 05:14:44.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 05:14:44.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 05:14:44.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 05:14:44.510  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 05:14:44.511  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 05:14:44.512 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 05:14:44.513 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 05:14:44.513 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 05:14:44.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 05:14:44.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 05:14:44.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 05:14:44.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 05:14:44.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 05:14:44.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 05:14:44.539 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 05:14:44.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:e1:00:0b:ea:05:7f:64:fb:b6:58:be:cc:bb:d1:ae:6c:61:f0:67]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:23:39.543  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:23:39.547 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:23:39.550 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:23:39.552 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:23:39.554  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:23:39.556  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:23:39.557  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:23:39.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:23:39.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:23:39.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:23:39.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:23:39.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:23:39.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:23:39.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:23:39.960  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:23:39.961  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:23:39.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:23:39.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:23:39.966  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:23:39.966  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:23:39.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:23:39.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:23:39.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:23:39.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:23:39.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:23:39.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:23:39.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:23:39.972 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:23:39.972 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:23:39.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:23:39.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:c9:22:5e:e5:d2:40:0f:5a:34:0a:64:6d:c7:a4:24:dd:95:16:9a]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:24:27.823  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:24:27.826 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:24:27.829 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-24 07:24:27.830 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:24:27.830  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-24 07:24:27.831  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:24:27.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:24:27.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:24:27.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:24:27.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:24:27.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:24:27.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:24:27.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:24:27.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:24:28.064  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:24:28.066  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:24:28.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:24:28.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:24:28.076  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:24:28.078  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:24:28.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:24:28.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:24:28.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:24:28.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:24:28.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:24:28.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:24:28.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:24:28.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:24:28.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:24:28.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:24:28.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:e2:20:b4:6d:06:4a:f5:d2:a9:bb:ec:ba:16:8f:87:4b:84:7b:40]
            modulus: c00fb0176e7ebc09f2c8e3fa2ec98dddd698d49a0bfeb5e790f7fa40eba37965a21417f942c9bcc15e7d180eab45ad437803699a6c62f4b336be99cf6aef1268e36fa1f153c94fd391b40d8931c6898f2ce63cf0277534b5fae995a44dd1b1391d28c213d6393fb65874cdfec3d7b3607abe3bf21c8b396593c97c85aa9c3b442f48ca75da770ead885cb0ad53ebef09f38641720b2d60c736806508503c174e328a2eb38d9bade3e036f81310b3b89cc4cf58fb42894e5bdd78e34b6972489bd933ec90b7114c116325d2387dca6fb7ee09c019fc719ca976f24a59fb2cc8bf5b1c376451cfbc8919d3e55390cc49327fd734318a9486aaa7d9a972af8f7267
    public exponent: 10001

] 
2022-04-24 07:25:27.846  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:25:27.848 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:25:27.850 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-24 07:25:27.851 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:25:27.852  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-24 07:25:27.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:25:27.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:25:27.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:25:27.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:25:27.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:25:27.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:25:27.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:25:27.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:25:27.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:25:28.067  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:25:28.068  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:25:28.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:25:28.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:25:28.072  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:25:28.072  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:25:28.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:25:28.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:25:28.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:25:28.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:25:28.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:25:28.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:25:28.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:25:28.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:25:28.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:25:28.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:25:28.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:7a:a5:11:d4:37:8f:f6:7d:95:29:56:48:54:3e:fa:ad:11:d5:cd]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:27:29.054  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:27:29.056 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:27:29.058 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-24 07:27:29.059 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:27:29.060  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-24 07:27:29.062  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:27:29.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:27:29.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:27:29.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:27:29.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:27:29.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:27:29.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:27:29.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:27:29.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:27:29.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:27:29.332  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:27:29.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:27:29.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:27:29.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:27:29.335  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:27:29.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:27:29.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:27:29.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:27:29.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:27:29.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:27:29.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:27:29.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:27:29.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:27:29.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:27:29.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:27:29.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:e7:42:18:37:b4:1b:bc:3b:b1:af:2d:cd:66:8e:89:90:00:60:8d]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:30:09.839  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:30:09.843 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:30:09.846 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-24 07:30:09.847 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:30:09.847  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-24 07:30:09.848  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:30:09.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:30:09.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:30:09.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:30:09.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:30:09.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:30:09.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:30:09.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:30:09.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:30:10.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:30:10.137  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:30:10.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:30:10.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:30:10.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:30:10.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:30:10.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:10.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:10.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:10.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:10.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:10.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:10.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:10.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:10.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:10.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:30:10.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:54:c7:c4:af:f0:9f:66:19:6f:b7:22:9a:be:72:8c:c8:c4:19:39]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:30:34.821  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:30:34.822 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:30:34.824 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-24 07:30:34.825 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:30:34.825  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-24 07:30:34.826  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:30:34.826  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:30:34.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:30:34.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:30:34.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:30:34.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:30:34.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:30:34.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:30:34.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:30:35.049  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:30:35.050  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:30:35.050 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:30:35.050 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:30:35.052  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:30:35.053  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:30:35.053 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:35.053 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:35.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:35.059 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:35.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:35.063 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:35.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:35.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:35.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:35.066 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:30:35.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:ca:26:0e:3f:e0:3d:95:83:3e:8d:2b:21:bd:2b:8e:0f:eb:f3:80]
            modulus: c2a9ffcaa002c7a884f67203f4f9ea20ee4ff4ec75fc03e41f7ee4a8e958d932cf2ee35e575ac7770a156f0efc3e9cecc710110b57ffd80c0f23f0b9c2bd8ea819b44c654b277dc4068e5ccf7235ca961395a51bdc898f9a277e779503ff137848849daaaa54844f5e54a598bbbcbb445f286ad7efc3b4e3f1c6700ec13fa58dd3fd903f748734535c506b1d07e286812d8a180e4bac1e72d2995332b4a173d770b548161edce589df93ad5a7146b8ce2d8c0e4a97c9e31238566e6ce0b590b8a49d38a624c179825a776ed0183c31c46a784d03eb30c1dd5a405b1b8c8dceca539abbd102c082f5f73712491b084932a7d0d29984497529eaf28e0f93668c2d
    public exponent: 10001

] 
2022-04-24 07:30:47.601  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:30:47.603 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:30:47.604 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:30:47.605 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:30:47.605  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:30:47.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:30:47.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:30:47.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:30:47.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:30:47.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:30:47.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:30:47.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:30:47.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:30:47.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:30:47.876  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:30:47.877  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:30:47.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:30:47.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:30:47.879  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:30:47.879  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:30:47.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:47.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:47.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:47.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:47.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:47.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:47.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:30:47.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:30:47.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:30:47.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:30:47.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:1e:17:db:55:ef:76:81:56:25:90:f0:a5:a1:b1:82:fc:00:7b:3f]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:35:24.616  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:35:24.618 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:35:24.620 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:35:24.621 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:35:24.621  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:35:24.621  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:35:24.622  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:35:24.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:35:24.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:35:24.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:35:24.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:35:24.637 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:35:24.637 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:35:24.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:35:24.893  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:35:24.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:35:24.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:35:24.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:35:24.896  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:35:24.896  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:35:24.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:35:24.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:35:24.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:35:24.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:35:24.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:35:24.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:35:24.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:35:24.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:35:24.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:35:24.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:35:24.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:f9:c9:62:9f:3b:74:67:29:93:d4:3e:44:5f:22:d7:ab:c9:cc:2b]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:40:09.648  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:40:09.652 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:40:09.657 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:40:09.658 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:40:09.658  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:40:09.659  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:40:09.660  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:40:09.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:40:09.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:40:09.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:40:09.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:40:09.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:40:09.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:40:09.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:40:09.869  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:40:09.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:40:09.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:40:09.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:40:09.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:40:09.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:40:09.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:40:09.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:40:09.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:40:09.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:40:09.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:40:09.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:40:09.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:40:09.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:40:09.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:40:09.878 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:40:09.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:8d:6d:28:92:2d:70:b1:0c:a9:1f:56:31:1c:b7:97:4f:73:61:78]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:44:28.591  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:44:28.594 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:44:28.596 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:44:28.596 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:44:28.597  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:44:28.597  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:44:28.598  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:44:28.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:44:28.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:44:28.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:44:28.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:44:28.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:44:28.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:44:28.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:44:29.002  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:44:29.002  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:44:29.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:44:29.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:44:29.004  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:44:29.005  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:44:29.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:44:29.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:44:29.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:44:29.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:44:29.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:44:29.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:44:29.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:44:29.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:44:29.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:44:29.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:44:29.013 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:7f:4b:2c:8e:59:02:ee:58:57:73:6f:22:d9:80:63:be:9f:2e:73]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:48:13.502  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:48:13.504 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:48:13.506 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-24 07:48:13.506 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:48:13.507  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-24 07:48:13.507  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:48:13.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:48:13.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:48:13.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:48:13.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:48:13.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:48:13.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:48:13.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:48:13.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:48:13.727  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:48:13.729  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:48:13.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:48:13.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:48:13.732  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:48:13.733  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:48:13.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:13.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:13.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:13.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:13.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:13.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:13.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:13.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:13.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:13.740 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:48:13.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:71:b3:59:83:5c:fa:98:32:b4:41:89:f7:86:9d:3c:84:18:40:4e]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:48:16.590  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:48:16.592 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:48:16.593 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:48:16.594 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:48:16.594  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:48:16.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:48:16.595  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:48:16.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:48:16.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:48:16.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:48:16.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:48:16.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:48:16.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:48:16.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:48:16.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:48:16.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:48:16.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:48:16.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:48:16.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:48:16.803  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:48:16.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:16.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:16.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:16.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:16.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:16.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:16.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:16.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:16.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:16.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:48:16.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:d7:60:0c:c2:39:ab:9d:96:cf:99:1c:67:5e:7d:38:e3:25:d8:9d]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:48:20.326  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:48:20.327 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:48:20.329 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-24 07:48:20.330 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:48:20.330  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-24 07:48:20.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:48:20.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:48:20.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:48:20.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:48:20.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:48:20.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:48:20.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:48:20.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:48:20.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:48:20.547  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:48:20.548  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:48:20.548 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:48:20.549 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:48:20.551  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:48:20.551  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:48:20.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:20.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:20.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:20.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:20.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:20.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:20.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:48:20.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:48:20.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:48:20.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:48:20.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:43:3d:86:c2:65:2c:fd:d4:12:55:53:2d:35:97:32:78:95:c7:75]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:52:29.150  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:52:29.153 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:52:29.159 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:52:29.160 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:52:29.160  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:52:29.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:52:29.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:52:29.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:52:29.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:52:29.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:52:29.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:52:29.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:52:29.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:52:29.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:52:29.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:52:29.418  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:52:29.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:52:29.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:52:29.420  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:52:29.420  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:52:29.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:52:29.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:52:29.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:52:29.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:52:29.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:52:29.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:52:29.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:52:29.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:52:29.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:52:29.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:52:29.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:06:fa:e8:02:bc:89:3d:bc:d4:61:4f:db:70:c7:bd:7a:a8:d7:6d]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 07:56:26.726  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 07:56:26.728 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 07:56:26.729 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:56:26.730 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 07:56:26.731  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 07:56:26.731  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 07:56:26.731  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 07:56:26.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 07:56:26.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 07:56:26.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 07:56:26.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 07:56:26.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:56:26.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 07:56:26.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:56:26.976  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 07:56:26.976  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 07:56:26.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 07:56:26.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 07:56:26.979  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 07:56:26.979  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 07:56:26.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:56:26.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:56:26.981 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:56:26.981 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:56:26.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:56:26.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:56:26.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 07:56:26.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 07:56:26.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 07:56:26.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 07:56:26.988 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:e7:08:ce:9b:68:78:55:19:37:28:8a:78:7f:2b:9f:ab:38:c9:31]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 08:00:48.396  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:00:48.399 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:00:48.402 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:00:48.403 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:00:48.404  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:00:48.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:00:48.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:00:48.405 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:00:48.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:00:48.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:00:48.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:00:48.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:00:48.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:00:48.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:00:48.648  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:00:48.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:00:48.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:00:48.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:00:48.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:00:48.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:00:48.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:00:48.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:00:48.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:00:48.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:00:48.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:00:48.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:00:48.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:00:48.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:00:48.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:00:48.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:00:48.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:c6:93:5c:a5:b4:a8:71:a7:b9:66:1a:b9:dd:2c:e8:8f:24:ab:3a]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 08:05:41.488  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:05:41.491 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:05:41.493 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:05:41.494 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:05:41.494  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:05:41.495  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:05:41.495  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:05:41.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:05:41.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:05:41.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:05:41.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:05:41.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:05:41.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:05:41.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:05:41.708  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:05:41.709  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:05:41.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:05:41.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:05:41.711  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:05:41.712  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:05:41.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:05:41.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:05:41.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:05:41.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:05:41.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:05:41.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:05:41.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:05:41.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:05:41.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:05:41.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:05:41.719 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:4e:45:6e:b7:0b:b5:ed:08:e6:a1:bc:5f:ed:2a:c5:0b:86:e2:17]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 08:09:48.656  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:09:48.659 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:09:48.660 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:09:48.661 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:09:48.662  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:09:48.662  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:09:48.664  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:09:48.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:09:48.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:09:48.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:09:48.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:09:48.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:09:48.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:09:48.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:09:48.933  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:09:48.934  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:09:48.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:09:48.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:09:48.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:09:48.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:09:48.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:09:48.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:09:48.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:09:48.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:09:48.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:09:48.940 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:09:48.940 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:09:48.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:09:48.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:09:48.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:09:48.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:e9:d0:aa:d2:39:c1:99:1e:87:7e:ea:cf:46:55:4d:fb:3d:b6:92]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 08:16:03.334  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:16:03.337 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:16:03.340 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:16:03.340 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:16:03.341  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:16:03.342  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:16:03.342  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:16:03.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:16:03.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:16:03.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:16:03.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:16:03.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:16:03.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:16:03.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:16:03.576  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:16:03.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:16:03.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:16:03.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:16:03.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:16:03.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:16:03.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:16:03.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:16:03.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:16:03.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:16:03.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:16:03.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:16:03.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:16:03.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:16:03.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:16:03.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:16:03.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:c2:fa:08:e9:52:34:cd:30:89:f4:c4:68:60:b3:7b:1e:7f:db:45]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 08:20:12.477  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:20:12.479 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:20:12.481 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:20:12.482 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:20:12.482  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:20:12.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:20:12.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:20:12.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:20:12.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:20:12.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:20:12.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:20:12.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:20:12.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:20:12.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:20:12.918  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:20:12.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:20:12.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:20:12.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:20:12.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:20:12.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:20:12.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:20:12.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:20:12.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:20:12.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:20:12.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:20:12.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:20:12.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:20:12.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:20:12.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:20:12.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:20:12.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 8c630c3ead00abb31e9afa8e00c85b0a5e7587b5d515e13eab757974cf3f2c56b998d95ebb487469494ce0b75373918d430a31faa7def5198f89e8539bfec5e6eb420f706d741845a9094b83d5f05d56fee13f1b3c0b35046b636d925ccfc806f182ec5df3fee3fabd8abc69db23950acfe9735d6809f46b5d576f3dca89163be28ddab16d5f58174d36a9d36877c5eef85e96d5368efd5b85351f13f5ea6d8ad66a1e6b51528d501b3c9f211d6701efcc7245c21e705ed67d7da02c90652655c4f9339509cb7c07c0b60a405bb91f09fd90baec1ef260cef3b06b2e0ddd9ce8ec67dda2ff653e16dd37050d8c497a8b845483ffb7ceee30cf88c2c829ce86f4cb9882d65326c9f91185609a312ed1d074e3ce2ea721bd332a28367c6d001f1f77f122b854e69ea69c2f6d0945b0c694f310e0f0bd266e5ee2cc078365d51c0d286643fbab1d81eb400fc98b82f65ed1f23de00dbb39e330d579fe30288e3c6eed9c64dbe839bcaa0fa53198a997bba638344876425f79d1250a26fe38de1e8d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:b9:3a:55:8a:04:f3:4c:d7:6c:67:69:f3:99:8c:c4:de:b8:e4:17]
            modulus: ab9ce559b85e73f4bea7d8960fa42fa9b9339c8d2b6d10d7b22d00972a7e5ed68407fbcb13e55c67c0f5b58fa5349f72c345026413dc3277cfde53da921aa846be75497440fbe9e0c559c9b8874d2cdfe0f57702587cbb834bd17591f0d1eaa100e7bdad9e6ca2a0f39ecb66f2baf17c39fc8d12115ee3012180949107f13eef2d90b0c4ab8af8cab271d2ff1de84b7102c6a24a249c40a960eb4d5f117c0544d51b4355584b7daedeb0e3c2fdca966bce067be272d36cd849cfd5c712d5383b88c8410f3d80e8f9f6500bc4a7cab77138d879d0e97de0ad593ddf3972a0372849c7a82025ed1ee036bb381c8c94275dd1b7ab00034a5bcf13ac6ae08a184ecd
    public exponent: 10001

] 
2022-04-24 08:29:06.972  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:29:06.976 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:29:06.978 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:29:06.979 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:29:06.980  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:29:06.980  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:29:06.980  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:29:06.981 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:29:06.981 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:29:06.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:29:06.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:29:06.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:29:06.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:29:06.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:29:07.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:29:07.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:29:07.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:29:07.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:29:07.195  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:29:07.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:29:07.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:29:07.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:29:07.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:29:07.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:29:07.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:29:07.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:29:07.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:29:07.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:29:07.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:29:07.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:29:07.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:0a:f0:54:de:92:76:d6:01:5d:f4:d1:d0:70:cf:9a:4f:1e:bf:57]
            modulus: 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
    public exponent: 10001

] 
2022-04-24 08:33:13.595  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-24 08:33:13.598 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-24 08:33:13.600 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:33:13.601 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-24 08:33:13.601  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-24 08:33:13.602  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-24 08:33:13.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-24 08:33:13.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-24 08:33:13.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-24 08:33:13.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-24 08:33:13.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-24 08:33:13.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:33:13.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-24 08:33:13.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:33:13.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-24 08:33:13.866  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-24 08:33:13.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-24 08:33:13.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-24 08:33:13.869  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-24 08:33:13.869  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-24 08:33:13.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:33:13.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:33:13.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:33:13.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:33:13.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:33:13.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:33:13.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-24 08:33:13.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-24 08:33:13.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-24 08:33:13.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-24 08:33:13.879 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43656516723889181389663497684650226998212637110
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 24 05:10:01 UTC 2022
           Final Date: Fri Apr 23 05:10:00 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0e:d3:aa:1e:65:38:c7:95:cf:b0:f4:14:30:d3:a0:a5:94:7f:e3:33]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 26ba1e8ac43b1d805106fc35c63e4ba33d5da1f6
                       20565b25296b0ac5e2426b5640d49b00a3e9d8fe
                       5f2a8755a278578ba09bf54fda1f45122556037e
                       859b1821423f74693b819ce82b4af42f43dcbbfa
                       6dd2d7ae60071514ef098d63d7942076de299319
                       4299880458ed59c21a9435e3f0f40151c022b65d
                       02286ddbe566940789e08c776dbe8d8ea94b9e88
                       74150c7241888a6d6ba6e4f8eafb6a22f5a73191
                       ae29d45f0e02279572de6e8cf5333de8c2c9ecae
                       c712614f82c52740ee34dec7e8c82e5f1304e18a
                       b09245a5b9a0347f3958ae94e7dd164ed08c4c30
                       017342f8436846544be510350c324397c0631b44
                       713d500241b8e8a2bad86010651aee011560d944
                       48dd1b9adabc3a64d6860c9344f6c24a5bd3783b
                       56485bdd8d7dcfa625b2c7fae68c5374a19c718b
                       47122e68738c005d3e810a0ed068e0afe944747e
                       ee834a6920e240fc540817880421470385f8b8ca
                       c5719568aff10253e593cd180ea32f1443b84194
                       e2f212e1aed5618b83f6569dc2bc49db9c6aeae5
                       eb3a69ec
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:dd:d5:ae:71:45:b5:ca:c5:c8:e9:ff:ba:a2:0a:80:4d:f8:35:af]
            modulus: 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
    public exponent: 10001

]