Results

By type

          2022-06-01 05:07:47,019 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-01 05:07:47,860 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-01 05:07:48.557  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 01, 2022 5:07:50 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 01, 2022 5:07:50 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 01, 2022 5:07:50 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 01, 2022 5:07:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-01 05:07:51.165 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-01 05:07:51.461  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-01 05:07:51.629  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-01 05:07:52.416 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-01 05:07:52.419 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-01 05:07:52.421 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-01 05:07:52.424 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-01 05:07:52.469 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-01 05:07:52.472 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-01 05:07:52.602 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-01 05:07:53.448 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 01, 2022 5:07:54 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-01 05:07:54.479  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.258 seconds (JVM running for 10.062)
Jun 01, 2022 5:08:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-01 05:08:46.852  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 05:08:46.861 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 05:08:46.906 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-01 05:08:46.910 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 05:08:46.926  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-01 05:08:46.928  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 05:08:46.929  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 05:08:46.930 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 05:08:46.931 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 05:08:46.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 05:08:46.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 05:08:46.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 05:08:46.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 05:08:46.988 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 05:08:46.988 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 05:08:46.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 05:08:47.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 05:08:47.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 05:08:47.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 05:08:47.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 05:08:47.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 05:08:47.580  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 05:08:47.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 05:08:47.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 05:08:47.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 05:08:47.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 05:08:47.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 05:08:47.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 05:08:47.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 05:08:47.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 05:08:47.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 05:08:47.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 05:08:47.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:c6:eb:1b:24:9a:c9:a9:2f:aa:be:90:5c:85:8d:70:ed:01:65:ea]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:25:58.718  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:25:58.722 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:25:58.726 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:25:58.727 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:25:58.728  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:25:58.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:25:58.730  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:25:58.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:25:58.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:25:58.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:25:58.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:25:58.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:25:58.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:25:58.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:25:58.989  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:25:58.990  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:25:58.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:25:58.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:25:58.994  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:25:58.995  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:25:58.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:25:58.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:25:58.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:25:58.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:25:58.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:25:58.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:25:59.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:25:59.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:25:59.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:25:59.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:25:59.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:24:ca:a0:38:a1:29:36:d3:f9:0c:f1:bc:ce:b7:95:28:ab:66:3b]
            modulus: cb8d6f56752b81be3a4774f47b47224ae46e907200cb0403214aaaff20911247d74e244a28071b513090da2dce4185e5d2b179cd368d4dd5fb49fbef77a89982f1a1957a0ad268eee2d9e68b30adabe02536ec77ccefe6aaf319b2e5d6fcc0d1edf821b701579e2077fdbfa205906f5d954d05075b41c81c6fa35b1627e0e6b145bb13130465a45c9d48347f0585fe965d382f4b4f33674b4670c66715d182adcf47ccca9a1e9cb5d65a25e5d128e48fc3011316cc015088f9b73c572bad612d4438bf04cb1cac431da8851703344271cff82923e223d6d198e1f7936b4c0de586bbb8066744546f4b7acc2bd34c9a4f5fd1bc90f484a322dedf9b6c11399f89
    public exponent: 10001

] 
2022-06-01 06:27:46.295  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:27:46.298 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:27:46.300 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-01 06:27:46.301 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:27:46.302  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-01 06:27:46.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:27:46.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:27:46.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:27:46.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:27:46.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:27:46.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:27:46.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:27:46.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:27:46.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:27:46.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:27:46.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:27:46.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:27:46.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:27:46.512  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:27:46.512  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:27:46.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:27:46.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:27:46.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:27:46.515 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:27:46.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:27:46.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:27:46.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:27:46.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:27:46.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:27:46.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:27:46.523 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:05:b9:8d:a8:af:94:e7:2c:61:8e:13:8f:d6:ee:ba:a1:65:d1:4a]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:29:05.672  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:29:05.673 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:29:05.674 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-01 06:29:05.675 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:29:05.676  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-01 06:29:05.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:29:05.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:29:05.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:29:05.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:29:05.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:29:05.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:29:05.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:29:05.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:29:05.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:29:05.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:29:05.822  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:29:05.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:29:05.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:29:05.825  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:29:05.826  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:29:05.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:29:05.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:29:05.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:29:05.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:29:05.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:29:05.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:29:05.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:29:05.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:29:05.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:29:05.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:29:05.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:47:09:a2:3e:6f:6a:b1:69:c9:41:bb:ba:c5:b1:17:73:5e:95:55]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:31:51.256  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:31:51.257 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:31:51.259 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:31:51.260 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:31:51.260  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:31:51.261  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:31:51.262  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:31:51.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:31:51.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:31:51.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:31:51.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:31:51.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:31:51.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:31:51.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:31:51.473  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:31:51.474  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:31:51.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:31:51.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:31:51.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:31:51.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:31:51.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:31:51.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:31:51.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:31:51.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:31:51.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:31:51.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:31:51.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:31:51.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:31:51.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:31:51.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:31:51.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:25:cd:7e:c1:87:0f:c9:92:1f:5d:b7:9f:1c:fe:03:ea:b9:b2:1e]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:35:23.686  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:35:23.690 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:35:23.693 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:35:23.695 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:35:23.695  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:35:23.696  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:35:23.697  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:35:23.697 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:35:23.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:35:23.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:35:23.705 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:35:23.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:35:23.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:35:23.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:35:26.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:35:26.521  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:35:26.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:35:26.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:35:26.524  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:35:26.527  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:35:26.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:35:26.529 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:35:26.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:35:26.534 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:35:26.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:35:26.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:35:26.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:35:26.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:35:26.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:35:26.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:35:26.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:bc:3c:7e:83:e0:0e:ff:76:33:cf:fe:29:af:3a:58:e5:5d:5f:77]
            modulus: c42aacbc6969428e3384b03bc87805d54ec30b3f5e441c5617ed7d3524f366c0d9d5352a588b3176c4065251b00221f1687411dc8014f29da70a381e058e9f53c8c0e37bb11e63f10b1af581e2a857af3ed5579505435265804e10249bd70813ba77f922c96fe3aa42e52a6b99c521084cccdb00135e1c37715cd52bce7312b55c1f6b2aac545452c2089be5e8c90d95a03982293fa6bec6a129bc2f70cc6d7870ce89b79a10e73f4c964ecdbc70908dccc2251b647959b3e6c0a42c3b18b7939d519f35d5bb9e3b76f47abe4992326625514cabf92b9b7e64beaeba954945f22f4018ee3f1a18d693108af8f3df273bc23838186e63e31702d9a53fdc8aebe3
    public exponent: 10001

] 
2022-06-01 06:40:56.261  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:40:56.264 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:40:56.268 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:40:56.269 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:40:56.270  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:40:56.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:40:56.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:40:56.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:40:56.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:40:56.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:40:56.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:40:56.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:40:56.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:40:56.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:40:56.451  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:40:56.452  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:40:56.453 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:40:56.453 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:40:56.455  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:40:56.455  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:40:56.456 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:40:56.456 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:40:56.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:40:56.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:40:56.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:40:56.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:40:56.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:40:56.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:40:56.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:40:56.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:40:56.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:17:55:17:81:18:56:9e:5d:92:cd:8c:19:18:12:78:3a:cd:20:68]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:46:06.912  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:46:06.914 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:46:06.918 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:46:06.921 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:46:06.922  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:46:06.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:46:06.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:46:06.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:46:06.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:46:06.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:46:06.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:46:06.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:46:06.944 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:46:06.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:46:07.132  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:46:07.133  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:46:07.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:46:07.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:46:07.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:46:07.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:46:07.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:46:07.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:46:07.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:46:07.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:46:07.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:46:07.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:46:07.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:46:07.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:46:07.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:46:07.140 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:46:07.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:76:93:b0:37:e2:73:05:5a:1b:03:b7:18:58:37:88:50:06:56:1a]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:47:51.487  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:47:51.488 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:47:51.490 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-01 06:47:51.490 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:47:51.491  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-01 06:47:51.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:47:51.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:47:51.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:47:51.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:47:51.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:47:51.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:47:51.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:47:51.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:47:51.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:47:51.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:47:51.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:47:51.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:47:51.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:47:51.702  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:47:51.702  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:47:51.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:47:51.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:47:51.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:47:51.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:47:51.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:47:51.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:47:51.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:47:51.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:47:51.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:47:51.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:47:51.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:f1:d3:39:00:d2:ce:2b:52:79:44:62:d7:e9:7d:17:ff:3c:08:dc]
            modulus: 9bd10378c66e2e70d69d37e78d9980077a8aea745c9c1b4af825b1ab0fb743a51ff58f81567eb77d3bb388ec1b9f22c520c7f76d9d7443d18fb9285055d16df5467dbbe239efdf3abe7bcab11f80d0b7c4045264ef92974198840491849a6df1127e16f7360d5f32f00d4b7a405b8bad907ac3bfd636e21ec42d67dde1b3d4208c16b69ad163257ddbd788e0500234dc340158f61346829695f4ae42a388d30a20c75991104d92f6100afad0449b0c7da1f1b3c0e11d772c703f0532547f77e858622d5c06338fab8ab6d64fc75d00e989021b0aceb9fea7f70e8bc2c45879cf0352dfd0e3d100721319b9f85b2044b245c5d405a38d349f8d94d01bf84a8a2d
    public exponent: 10001

] 
2022-06-01 06:49:50.826  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:49:50.829 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:49:50.832 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:49:50.833 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:49:50.834  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:49:50.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:49:50.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:49:50.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:49:50.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:49:50.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:49:50.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:49:50.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:49:50.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:49:50.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:49:51.009  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:49:51.010  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:49:51.011 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:49:51.011 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:49:51.013  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:49:51.014  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:49:51.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:49:51.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:49:51.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:49:51.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:49:51.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:49:51.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:49:51.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:49:51.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:49:51.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:49:51.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:49:51.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:99:53:94:ca:15:48:16:de:71:72:e1:6b:bc:45:4a:eb:65:47:64]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:52:09.066  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:52:09.067 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:52:09.069 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-01 06:52:09.070 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:52:09.072  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-01 06:52:09.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:52:09.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:52:09.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:52:09.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:52:09.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:52:09.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:52:09.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:52:09.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:52:09.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:52:09.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:52:09.277  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:52:09.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:52:09.278 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:52:09.281  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:52:09.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:52:09.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:52:09.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:52:09.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:52:09.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:52:09.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:52:09.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:52:09.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:52:09.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:52:09.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:52:09.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:52:09.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:07:cc:3c:2e:c2:5c:33:a8:3a:5d:1d:5d:75:38:33:74:75:e5:91]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 06:52:25.878  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:52:25.879 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:52:25.882 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-01 06:52:25.883 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:52:25.883  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-01 06:52:25.884  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:52:25.884  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:52:25.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:52:25.887 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:52:25.887 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:52:25.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:52:25.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:52:25.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:52:25.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:52:26.035  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:52:26.036  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:52:26.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:52:26.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:52:26.038  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:52:26.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:52:26.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:52:26.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:52:26.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:52:26.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:52:26.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:52:26.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:52:26.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:52:26.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:52:26.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:52:26.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:52:26.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:83:d1:23:c4:c9:a2:eb:3b:ee:36:57:1f:d9:a3:ce:8c:1d:6e:ad]
            modulus: c4b79e1ed5ca1817e8341ce48c9bf24e2e6721dbd73273aea68a716d63358ac626cb6412cf2d11a569809ab212e711daa369f99a2aaae36148dade999222fee9ca0fb4ff0b4f8a3231a96e4eacb27ef7430c26680ac88838228ff8bc2d2b0f7674d496b2a7ec5fc88cc6ad755af8aee28104739627277919da70ac67ed8ce9f46696faf092c9b6fb8b20d0baae353d1cfe68dede85c263ce6487d0370c0c07f0270f7a93a04e8bc6831faff6a3ded489bbb1bf0f59612a4110b1c08a802668f74f9531f49de005bef854897dbf8f92e3f527a13bcfcdc83149eaca7b0ae1e04a46a6f8e35632a10fb258583da1245b9b42afa665ce8abefaa960c7f97bc52d37
    public exponent: 10001

] 
2022-06-01 06:55:08.948  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 06:55:08.959 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 06:55:08.960 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:55:08.961 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 06:55:08.961  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 06:55:08.962  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 06:55:08.962  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 06:55:08.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 06:55:08.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 06:55:08.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 06:55:08.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 06:55:08.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:55:08.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 06:55:08.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:55:09.096  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 06:55:09.097  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 06:55:09.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 06:55:09.098 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 06:55:09.099  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 06:55:09.099  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 06:55:09.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:55:09.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:55:09.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:55:09.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:55:09.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:55:09.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:55:09.102 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 06:55:09.102 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 06:55:09.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 06:55:09.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 06:55:09.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:b0:f5:45:bc:af:85:04:57:21:cf:19:68:d1:3a:8c:ee:d6:a0:4d]
            modulus: b9ee09a0d882ca37757355708a681ff9ef14f82996625aaa77e84aca75b5c661affbe4e9ca279cbf661f99d321f4213b465c8e380470764bdd43f0ef3cdf4dff3faaadc16794a40ef0a089f3e76bbc26a51c981465a841aa39fda4b1b65eacd1ab8f833733c1e34454a35de07655d75e8b69e3058747fcc7537c5f49fd9cb44a6fd1643c82489a5d74adfcb18760d58fc2502d3f5f62dc95a39f8cada1febe1c55725c1eef495329bca48449b2e2a5f7be9c20db07322260f0a56c02ed6c9fc65d457c3b9642a24ccb8cdbc79bc92042496eaab0eeff96c4b1411093165088fd344f8e142ee83f58b5c448b56265eebb445ce6432c32fe4e44a956d0640c6e91
    public exponent: 10001

] 
2022-06-01 07:02:21.435  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 07:02:21.438 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 07:02:21.441 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 07:02:21.442 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 07:02:21.442  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 07:02:21.443  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 07:02:21.443  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 07:02:21.444 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 07:02:21.444 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 07:02:21.445 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 07:02:21.450 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 07:02:21.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 07:02:21.453 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 07:02:21.453 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 07:02:21.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 07:02:21.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 07:02:21.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 07:02:21.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 07:02:21.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 07:02:21.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 07:02:21.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 07:02:21.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 07:02:21.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 07:02:21.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 07:02:21.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 07:02:21.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 07:02:21.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 07:02:21.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 07:02:21.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 07:02:21.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 07:02:21.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:e3:90:b1:b4:95:b0:2c:ee:75:3c:e8:d4:34:b4:bc:cb:4d:0e:cc]
            modulus: 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
    public exponent: 10001

] 
2022-06-01 07:07:06.192  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-01 07:07:06.194 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-01 07:07:06.195 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 07:07:06.195 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-01 07:07:06.196  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-01 07:07:06.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-01 07:07:06.197  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-01 07:07:06.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-01 07:07:06.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-01 07:07:06.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-01 07:07:06.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-01 07:07:06.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 07:07:06.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-01 07:07:06.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 07:07:06.330  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-01 07:07:06.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-01 07:07:06.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-01 07:07:06.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-01 07:07:06.332  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-01 07:07:06.333  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-01 07:07:06.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 07:07:06.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 07:07:06.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 07:07:06.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 07:07:06.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 07:07:06.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 07:07:06.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-01 07:07:06.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-01 07:07:06.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-01 07:07:06.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-01 07:07:06.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719400553686410498659937150840298310265508861706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 01 05:05:10 UTC 2022
           Final Date: Mon May 31 05:05:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [08:8f:cf:d3:d9:10:05:76:66:0a:bd:cf:94:34:8a:5a:f2:99:f6:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 51811249451cd24e58531b6d4f4d0c8b8c445d91
                       1ca9379064d8280eee9195c517479bfc0fe4c7f4
                       a948ed9cb81350e86152cadcf8d3940f262f143f
                       90dadf41ec94cb29b9ddf17d0ba7b4a138b3bf90
                       7ec881e3c1b4fcec25d649f0eb6c67ef653bcf80
                       5e8ff6879deed982473ceab0a7f4bce9057cd011
                       4bfd61ef9afe0608ea528520d74d399f07a31d2e
                       a6fb738faad2af8b6147a03ac46a52fef8c987c9
                       5d5bffdc62372f460dd9c0a95c90136251808f58
                       2f3db0965d42b76841241ccf7ed928b2b5eb0010
                       da4263cbc73c0e26d309bef318c7c0ccb776c66f
                       b95c8e618d5e84829326c321321c772d7832dc68
                       69e3021ba040c420b5a5cfa9c0cb16170538a0e0
                       cb72ff67857cdd1b7fb3396a38636a3df2974bda
                       c6a2e89b9d562ff3c4828a387256cebcb6cb24c4
                       daf2fe3ee07b0ac8f6cc794bf0732542fc539423
                       2f338bbdf7f719c32378c8547707c6431dc6bac7
                       739991b2e510de1dd4355c04104a14b9f63f9111
                       f93d9cf7a219ae5814b09705047dfadf703039ec
                       c3ed81c5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:53:12:42:50:e0:33:db:70:1a:ac:e2:a4:55:50:2d:ee:e8:5a:f4]
            modulus: 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
    public exponent: 10001

]