Results

By type

          2022-05-31 05:06:47,201 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-31 05:06:47,802 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-31 05:06:48.275  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 31, 2022 5:06:49 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 31, 2022 5:06:49 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 31, 2022 5:06:49 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 31, 2022 5:06:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-31 05:06:49.920 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-31 05:06:50.108  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-31 05:06:50.219  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-31 05:06:50.669 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-31 05:06:50.671 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-31 05:06:50.672 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-31 05:06:50.675 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-31 05:06:50.702 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-31 05:06:50.704 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-31 05:06:50.778 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-31 05:06:51.208 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 31, 2022 5:06:51 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-31 05:06:51.890  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 5.198 seconds (JVM running for 6.24)
May 31, 2022 5:07:17 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-31 05:07:34.005  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 05:07:34.012 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 05:07:34.046 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-31 05:07:34.049 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 05:07:34.059  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-31 05:07:34.062  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 05:07:34.063  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 05:07:34.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 05:07:34.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:07:34.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 05:07:34.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 05:07:34.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 05:07:34.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 05:07:34.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:07:34.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:07:34.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 05:07:34.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 05:07:34.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 05:07:34.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 05:07:34.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 05:07:34.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 05:07:34.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 05:07:34.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:07:34.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:07:34.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:07:34.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:07:34.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:07:34.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:07:34.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:07:34.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:07:34.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:07:34.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 05:07:34.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:d5:e8:bb:69:e1:69:25:51:63:8d:f9:4d:c4:c3:38:ba:2d:15:fa]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:32:18.443  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:32:18.445 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:32:18.447 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:32:18.448 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:32:18.448  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:32:18.449  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:32:18.449  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:32:18.449 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:32:18.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:32:18.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:32:18.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:32:18.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:32:18.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:32:18.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:32:18.633  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:32:18.634  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:32:18.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:32:18.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:32:18.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:32:18.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:32:18.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:32:18.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:32:18.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:32:18.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:32:18.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:32:18.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:32:18.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:32:18.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:32:18.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:32:18.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:32:18.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:af:9c:25:29:12:64:69:ed:cd:b2:d8:fd:50:a0:1e:ae:c4:80:0d]
            modulus: b75f8dd0e48dc7f8a236cc66d17131ade15700e42c1fbd865255fabd37670f724dbc0e533f0ebdc1a2199229012042b69400c460491b4b6ffeda2af8e6b1559f48232374895ce3a19729bff94a2fa2823f31d0f68474f130a3f281983302e348f9473ec6b8e1e86e7c7072cdbdecfd5a2e1e6b076a98a8d0e76710d56683444879a9436c640a7e8a51b5943de5d6f740d62da5483bdc8794e92327392ca86fb625b297133196e01b03b53085a395902a61deceef06a511e46856b31dc02d0266fc338ef9a6fca653ed49057d36425e2ae2d3710391d34aaedacec60fad3834d7b11b677e0c6caafdc674a19307b7a2224e58df7a373858735ca6e616f36b2a5d
    public exponent: 10001

] 
2022-05-31 07:34:06.301  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:34:06.302 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:34:06.304 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-31 07:34:06.305 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:34:06.305  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-31 07:34:06.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:34:06.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:34:06.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:34:06.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:34:06.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:34:06.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:34:06.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:34:06.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:34:06.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:34:06.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:34:06.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:34:06.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:34:06.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:34:06.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:34:06.447  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:34:06.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:34:06.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:34:06.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:34:06.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:34:06.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:34:06.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:34:06.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:34:06.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:34:06.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:34:06.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:34:06.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: de2d15852920d72630b2b44e654dd49ade7282096214b47b2177f417bbb0a6aee648be4e2400d69f1278c909e4ea9a57128d5580b171fc44daa55c8180aac826629134dbb707870d80301533bc280f466ec38932066d1f1b5696b30eb0cc2a14fd4c2655358d6b8585da6396b4040a5e5e7ea939dcd2044612a346f6dc930f7463fbcbddf47eb783029c9c0ab2dfc98c2da9e208e6f23826fa9d2be70c4368f14ebc71a9888311079f5c48b74c99de2b3cb7324dec8478339871b2a1440e4dd0c328f23da80b73005928848acfd41506c9d149c4d71f95d6065b32578ba1a48015099a7bebb62965380381be318158b5d8a59b1c6aec13fb9bd9a1d7bf779e05b5b70724b8c57faf2760961515af5c6bf4ef081a1b21d353ceced351e0a4936848ad62937e891e8506db279f9035a044bb43ec26254ef50cbc9bbf290e5cedb348665cefa681e466561f5ae254d2a7af3e1d2df2168276572ba4f9bd6db610d3c9ba96621258d0d99bc4dc3c67f3024122dfea4760ed7185469fc9b664d7fad9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:fb:c6:4f:65:da:88:ac:20:96:7f:5f:d0:7b:e1:ff:b6:52:23:55]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:35:28.468  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:35:28.469 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:35:28.471 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-31 07:35:28.472 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:35:28.472  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-31 07:35:28.472  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:35:28.473  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:35:28.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:35:28.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:35:28.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:35:28.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:35:28.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:35:28.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:35:28.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:35:28.580  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:35:28.581  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:35:28.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:35:28.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:35:28.583  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:35:28.584  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:35:28.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:35:28.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:35:28.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:35:28.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:35:28.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:35:28.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:35:28.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:35:28.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:35:28.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:35:28.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:35:28.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:18:95:58:b3:09:af:f4:fa:5d:78:ae:1b:ca:db:c3:6b:9a:83:9c]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:37:44.918  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:37:44.918 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:37:44.919 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:37:44.920 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:37:44.920  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:37:44.920  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:37:44.921  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:37:44.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:37:44.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:37:44.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:37:44.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:37:44.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:37:44.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:37:44.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:37:45.058  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:37:45.059  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:37:45.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:37:45.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:37:45.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:37:45.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:37:45.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:37:45.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:37:45.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:37:45.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:37:45.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:37:45.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:37:45.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:37:45.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:37:45.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:37:45.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:37:45.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:51:52:d0:18:88:df:72:d5:74:db:8d:2e:f9:78:f4:9b:f2:e5:12]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:41:18.997  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:41:18.999 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:41:19.001 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:41:19.002 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:41:19.002  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:41:19.003  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:41:19.003  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:41:19.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:41:19.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:41:19.005 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:41:19.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:41:19.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:41:19.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:41:19.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:41:19.139  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:41:19.140  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:41:19.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:41:19.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:41:19.142  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:41:19.142  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:41:19.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:41:19.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:41:19.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:41:19.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:41:19.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:41:19.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:41:19.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:41:19.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:41:19.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:41:19.145 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:41:19.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:40:35:b5:bd:26:3c:1b:5c:d7:b9:2e:94:43:6b:67:77:75:2c:7a]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:46:03.360  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:46:03.362 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:46:03.363 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:46:03.364 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:46:03.364  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:46:03.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:46:03.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:46:03.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:46:03.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:46:03.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:46:03.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:46:03.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:46:03.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:46:03.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:46:03.478  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:46:03.478  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:46:03.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:46:03.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:46:03.480  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:46:03.481  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:46:03.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:46:03.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:46:03.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:46:03.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:46:03.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:46:03.483 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:46:03.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:46:03.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:46:03.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:46:03.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:46:03.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:a0:dc:5d:d6:34:d9:09:64:14:b7:ed:8b:3d:37:aa:47:cf:4a:88]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:50:22.792  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:50:22.793 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:50:22.795 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:50:22.796 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:50:22.796  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:50:22.796  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:50:22.796  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:50:22.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:50:22.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:50:22.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:50:22.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:50:22.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:50:22.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:50:22.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:50:22.913  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:50:22.914  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:50:22.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:50:22.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:50:22.916  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:50:22.917  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:50:22.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:50:22.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:50:22.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:50:22.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:50:22.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:50:22.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:50:22.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:50:22.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:50:22.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:50:22.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:50:22.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:29:a9:b5:03:4f:ea:70:d1:36:28:cc:16:ff:33:03:fb:1a:bd:3d]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:54:14.053  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:54:14.055 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:54:14.056 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:54:14.056 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:54:14.056  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:54:14.057  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:54:14.057  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:54:14.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:54:14.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:54:14.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:54:14.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:54:14.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:54:14.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:54:14.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:54:14.160  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:54:14.161  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:54:14.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:54:14.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:54:14.162  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:54:14.162  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:54:14.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:54:14.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:54:14.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:54:14.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:54:14.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:54:14.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:54:14.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:54:14.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:54:14.164 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:54:14.164 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:54:14.166 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:de:17:24:c4:39:1b:b3:b7:ac:72:54:7c:97:70:10:f5:bc:07:63]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 07:58:31.785  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 07:58:31.787 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 07:58:31.788 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:58:31.789 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 07:58:31.789  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 07:58:31.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 07:58:31.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 07:58:31.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 07:58:31.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 07:58:31.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 07:58:31.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 07:58:31.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:58:31.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 07:58:31.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:58:31.930  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 07:58:31.931  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 07:58:31.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 07:58:31.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 07:58:31.933  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 07:58:31.933  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 07:58:31.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:58:31.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:58:31.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:58:31.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:58:31.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:58:31.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:58:31.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 07:58:31.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 07:58:31.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 07:58:31.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 07:58:31.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:d3:62:53:6d:a3:e8:d0:86:55:40:bf:4e:7b:a6:9c:82:87:16:46]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:02:46.509  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:02:46.511 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:02:46.513 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:02:46.513 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:02:46.514  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:02:46.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:02:46.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:02:46.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:02:46.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:02:46.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:02:46.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:02:46.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:02:46.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:02:46.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:02:46.626  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:02:46.626  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:02:46.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:02:46.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:02:46.627  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:02:46.628  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:02:46.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:02:46.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:02:46.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:02:46.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:02:46.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:02:46.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:02:46.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:02:46.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:02:46.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:02:46.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:02:46.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: de2d15852920d72630b2b44e654dd49ade7282096214b47b2177f417bbb0a6aee648be4e2400d69f1278c909e4ea9a57128d5580b171fc44daa55c8180aac826629134dbb707870d80301533bc280f466ec38932066d1f1b5696b30eb0cc2a14fd4c2655358d6b8585da6396b4040a5e5e7ea939dcd2044612a346f6dc930f7463fbcbddf47eb783029c9c0ab2dfc98c2da9e208e6f23826fa9d2be70c4368f14ebc71a9888311079f5c48b74c99de2b3cb7324dec8478339871b2a1440e4dd0c328f23da80b73005928848acfd41506c9d149c4d71f95d6065b32578ba1a48015099a7bebb62965380381be318158b5d8a59b1c6aec13fb9bd9a1d7bf779e05b5b70724b8c57faf2760961515af5c6bf4ef081a1b21d353ceced351e0a4936848ad62937e891e8506db279f9035a044bb43ec26254ef50cbc9bbf290e5cedb348665cefa681e466561f5ae254d2a7af3e1d2df2168276572ba4f9bd6db610d3c9ba96621258d0d99bc4dc3c67f3024122dfea4760ed7185469fc9b664d7fad9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:68:b8:21:d2:3b:e1:df:3d:45:65:21:73:63:e4:3d:fa:4d:6d:10]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:06:56.263  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:06:56.265 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:06:56.268 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:06:56.269 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:06:56.269  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:06:56.269  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:06:56.270  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:06:56.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:06:56.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:06:56.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:06:56.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:06:56.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:06:56.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:06:56.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:06:56.377  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:06:56.378  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:06:56.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:06:56.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:06:56.381  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:06:56.381  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:06:56.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:06:56.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:06:56.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:06:56.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:06:56.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:06:56.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:06:56.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:06:56.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:06:56.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:06:56.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:06:56.391 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:52:8d:51:a5:d6:29:d0:f6:9e:dd:cb:72:a5:64:45:d0:65:fc:b3]
            modulus: c62cef3635edc35a5366c987be22407fe73b74b97f872a356fae5d96de997462681de2a739cfa02376ffb1a9637053c6091fd1f09a6165da5c8f664fb94fbf2344c5259462f553d85011d8d7abecaff4e1960fb75c6b7b89171307a796eb2bf6c00b13c6e7803e7a71cc33c70dc80b726fc072f5a66c2d0b99a5414ae0efd3461a08864a678f2dc2d0564a5bca84fa13b8e4117a325f4a7fe5479d016992c51e365539b4a55c52e36ffdba863af027a930991f87983186a5219f5368c1f48d4cab540425698a82daa9334d0668d92db659e9226581f3865d151d5f1a0e2b0dd9a312b317fa0a0bd602639ce397e6f0716bd195b3892f04e7e697157073967259
    public exponent: 10001

] 
2022-05-31 08:11:50.157  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:11:50.160 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:11:50.163 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:11:50.164 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:11:50.165  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:11:50.165  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:11:50.166  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:11:50.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:11:50.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:11:50.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:11:50.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:11:50.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:11:50.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:11:50.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:11:50.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:11:50.261  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:11:50.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:11:50.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:11:50.262  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:11:50.262  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:11:50.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:11:50.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:11:50.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:11:50.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:11:50.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:11:50.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:11:50.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:11:50.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:11:50.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:11:50.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:11:50.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:56:10:27:f6:ff:c1:14:bf:d3:0a:8e:2b:29:bb:05:e6:d5:b6:00]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:15:53.569  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:15:53.570 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:15:53.572 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:15:53.574 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:15:53.574  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:15:53.575  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:15:53.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:15:53.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:15:53.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:15:53.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:15:53.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:15:53.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:15:53.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:15:53.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:15:53.676  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:15:53.677  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:15:53.677 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:15:53.677 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:15:53.678  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:15:53.678  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:15:53.678 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:15:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:15:53.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:15:53.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:15:53.682 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:5a:b5:5d:4c:8d:e6:6a:47:97:94:db:a1:04:44:a0:a3:34:3f:c4]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:21:53.099  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:21:53.102 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:21:53.104 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:21:53.104 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:21:53.105  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:21:53.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:21:53.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:21:53.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:21:53.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:21:53.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:21:53.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:21:53.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:21:53.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:21:53.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:21:53.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:21:53.211  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:21:53.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:21:53.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:21:53.212  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:21:53.213  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:21:53.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:21:53.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:21:53.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:21:53.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:21:53.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:21:53.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:21:53.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:21:53.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:21:53.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:21:53.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:21:53.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:31:12:ab:9c:bf:b0:d7:10:64:7a:fe:ab:ff:94:d2:55:b0:b6:0c]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:26:07.081  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:26:07.083 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:26:07.085 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:26:07.086 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:26:07.086  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:26:07.087  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:26:07.087  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:26:07.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:26:07.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:26:07.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:26:07.093 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:26:07.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:26:07.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:26:07.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:26:07.210  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:26:07.211  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:26:07.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:26:07.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:26:07.213  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:26:07.213  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:26:07.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:26:07.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:26:07.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:26:07.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:26:07.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:26:07.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:26:07.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:26:07.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:26:07.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:26:07.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:26:07.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:6a:03:f8:18:6a:38:9e:73:1b:66:16:6f:ee:38:e9:c7:f6:55:ca]
            modulus: a846019155450a38ec01d43eabaec3f5cc091457ba266b33fc34dd2f082e36fd71c829be6c6399dde65defcce8ba390edc5a7a48c87f18fe3da0d4620439a598b19c25f1ba5d027c9a362f38f660911f97969e06caa32b834608cec392f83b2dd1772cfb5caf95df79593b22ebdc9a5376776c628a3c22ac30675fe7f25e02a6e5abc3bfb3f7614e69ae119c12d3c57ebb2a3a57358f58d7ea4c16005b8f265c7c3b797355bf1d91fe85eec8c0e5e3f1ebfe6bde8c5cffcb1268bd1dcaeeaf22d12b89b28ea938ddc01680f8d3f6f16f3a88ee22cef0bbde3a182ad382525f1fba8bba31f1f2ad970c672625d377efeea581a3e468751db257c6fe9f4a173741
    public exponent: 10001

] 
2022-05-31 08:35:41.546  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:35:41.549 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:35:41.551 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:35:41.552 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:35:41.552  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:35:41.553  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:35:41.553  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:35:41.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:35:41.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:35:41.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:35:41.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:35:41.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:35:41.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:35:41.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:35:41.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:35:41.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:35:41.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:35:41.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:35:41.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:35:41.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:35:41.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:35:41.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:35:41.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:35:41.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:35:41.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:35:41.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:35:41.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:35:41.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:35:41.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:35:41.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:35:41.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:7a:13:e6:d4:00:8f:95:7d:ca:20:4b:cb:95:a2:b0:78:80:68:51]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:39:53.181  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:39:53.183 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:39:53.184 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:39:53.185 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:39:53.185  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 08:39:53.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:39:53.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:39:53.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:39:53.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:39:53.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:39:53.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:39:53.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:39:53.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:39:53.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:39:53.271  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:39:53.272  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:39:53.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:39:53.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:39:53.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:39:53.275  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:39:53.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:39:53.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:39:53.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:39:53.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:39:53.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:39:53.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:39:53.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:39:53.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:39:53.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:39:53.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:39:53.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:7c:fa:40:37:f0:13:a2:5a:42:22:53:ff:0d:c4:c4:07:85:4d:02]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:40:28.802  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:40:28.803 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:40:28.804 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-31 08:40:28.804 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:40:28.804  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-31 08:40:28.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:40:28.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:40:28.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:40:28.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:40:28.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:40:28.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:40:28.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:40:28.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:40:28.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:40:28.903  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:40:28.903  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:40:28.903 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:40:28.903 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:40:28.904  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:40:28.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:40:28.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:40:28.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:40:28.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:40:28.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:40:28.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:40:28.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:40:28.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:40:28.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:40:28.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:40:28.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:40:28.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:11:cc:77:dd:81:bd:51:0f:2a:96:f3:1c:00:8c:49:c5:f3:31:f0]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:46:57.478  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:46:57.480 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:46:57.482 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-31 08:46:57.483 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:46:57.483  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-31 08:46:57.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:46:57.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:46:57.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:46:57.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:46:57.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:46:57.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:46:57.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:46:57.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:46:57.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:46:57.606  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:46:57.607  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:46:57.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:46:57.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:46:57.609  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:46:57.610  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:46:57.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:46:57.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:46:57.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:46:57.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:46:57.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:46:57.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:46:57.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:46:57.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:46:57.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:46:57.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:46:57.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:85:07:22:c5:9f:3e:18:df:a3:57:1b:d2:12:cc:fa:cb:0b:8a:1e]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 08:47:10.532  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 08:47:10.533 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 08:47:10.534 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-31 08:47:10.535 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 08:47:10.535  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-31 08:47:10.536  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 08:47:10.536  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 08:47:10.536 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 08:47:10.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 08:47:10.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 08:47:10.542 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 08:47:10.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:47:10.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 08:47:10.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:47:10.617  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 08:47:10.617  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 08:47:10.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 08:47:10.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 08:47:10.619  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 08:47:10.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 08:47:10.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:47:10.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:47:10.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:47:10.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:47:10.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:47:10.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:47:10.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 08:47:10.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 08:47:10.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 08:47:10.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 08:47:10.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 406166284219211281734109507062969232695150233285
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 05:05:15 UTC 2022
           Final Date: Sun May 30 05:05:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:09:94:44:53:5f:a2:47:33:e3:81:3c:97:e2:17:4f:7a:2c:b3:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e4b5659c43e8d15d4f4c7c8580419f784d9fcfc
                       09debcf3406ebe4bd120e14886235b6ea0d8e8c3
                       b3ac9bd9e160697718bd31ce75c523df1ed669f6
                       b33661310e5ca4c7a6f061021a06da20c21017c2
                       d5f7c0c60c05d209fac7857cdf2cde3a8f69dbec
                       c5b6189b852d4c76607eae9a72cef716b088a9c1
                       58cca062772280a9bd13311c7daa6d147a65b286
                       dbb39c9e20f285549efee6c016e44d8ba7cdacfe
                       f613d964ae0feba86bab12573e5c88a056fea648
                       d5bb9e10d5eb9e45cce195d74ba649468fbfd17d
                       1ccbd4cb38542d22d3374c3f1f8af54a79f07af9
                       d7c27734dd54da34dddf4eaa729a01c21ab4ad34
                       ee50a7dc0a216931ce35445ce583230b25af30ef
                       84dec4fdba6f7a0c5db6f459a90cb833dd992308
                       61e775dc41694040a2812474ed53be6dac7a387c
                       5ac7f52f24b0e845a73e06e6dd36b892be130a79
                       7f183406ca129277267c4736892bf2faca2c2016
                       351b6e55c308cc93c785932b407bb925937f49d6
                       aab87431c943834d01f8733517a5181a049b2e64
                       87d6866b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:fb:4d:39:03:b0:c5:ba:b3:53:b1:8e:3b:81:68:9d:e6:c2:67:1b]
            modulus: c8c7fefc9d306ca589b75d44a596e9a8fb4959e8cbf4e3e930c01d9967c0ebd4e2610d76031034e3d857415b3fddf347d1fd06676b5274f2e82f045fa0a262e29cd40483ee8a8b32e95de4a6267fdb3079c7601d78ead218240492fec7c7a7bd8f636e835e769d3d0d3df3ca8d592d4179053c9e08ecc7997f12834ee06a47f954ae4a047b2141225ecd0475a5f0bb23e6ddcae1cd1f297b6e1080dd08fe4578cbd2cd70afb9da09443967c59b323a06bab589be03d7fe98fc555c1ae5f4db9ba16351d51b32bd3c8ff4e5d24f25f0c071440c9689f78ae73d896cf5b13d1ca5c2e538aab4a66432aed4779a46f781943bb0646b04a8444af4cbcef1f8aa2a4f
    public exponent: 10001

]