Results

By type

          2022-06-05 05:14:58,755 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-05 05:15:00,536 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-05 05:15:01.737  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 05, 2022 5:15:04 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 05, 2022 5:15:04 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 05, 2022 5:15:04 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 05, 2022 5:15:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-05 05:15:05.333 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-05 05:15:05.714  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-05 05:15:05.976  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-05 05:15:07.211 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-05 05:15:07.215 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-05 05:15:07.217 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-05 05:15:07.222 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-05 05:15:07.274 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-05 05:15:07.280 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-05 05:15:07.432 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-05 05:15:08.343 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 05, 2022 5:15:09 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-05 05:15:09.582  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 11.89 seconds (JVM running for 13.822)
Jun 05, 2022 5:15:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-05 05:15:48.624  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 05:15:48.640 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 05:15:48.706 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-05 05:15:48.713 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 05:15:48.742  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-05 05:15:48.747  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 05:15:48.749  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 05:15:48.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 05:15:48.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 05:15:48.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 05:15:48.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 05:15:48.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 05:15:48.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 05:15:48.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 05:15:48.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 05:15:48.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 05:15:49.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 05:15:49.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 05:15:49.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 05:15:49.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 05:15:49.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 05:15:49.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 05:15:49.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 05:15:49.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 05:15:49.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 05:15:49.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 05:15:49.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 05:15:49.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 05:15:49.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 05:15:49.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 05:15:49.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 05:15:49.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 05:15:49.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:c0:5b:10:b3:6f:26:d0:70:58:0f:35:c0:36:de:2a:e4:e0:c9:9e]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 06:54:23.374  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 06:54:23.377 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 06:54:23.381 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 06:54:23.383 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 06:54:23.384  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 06:54:23.385  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 06:54:23.386  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 06:54:23.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 06:54:23.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 06:54:23.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 06:54:23.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 06:54:23.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:54:23.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:54:23.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:54:23.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 06:54:23.581  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 06:54:23.582 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 06:54:23.582 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:54:23.586  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 06:54:23.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 06:54:23.587 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:54:23.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:54:23.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:54:23.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:54:23.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:54:23.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:54:23.593 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:54:23.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:54:23.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:54:23.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 06:54:23.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:03:06:eb:c3:e6:ae:bb:6f:5d:cb:6b:17:9a:17:de:ad:55:25:a8]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 06:56:11.687  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 06:56:11.688 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 06:56:11.690 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-05 06:56:11.691 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 06:56:11.692  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-05 06:56:11.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 06:56:11.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 06:56:11.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 06:56:11.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 06:56:11.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 06:56:11.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 06:56:11.704 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:56:11.704 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:56:11.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:56:11.857  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 06:56:11.858  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 06:56:11.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 06:56:11.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:56:11.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 06:56:11.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 06:56:11.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:56:11.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:56:11.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:56:11.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:56:11.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:56:11.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:56:11.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:56:11.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:56:11.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:56:11.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 06:56:11.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:34:ed:89:e0:49:77:74:8c:fb:cd:0b:51:3a:90:f4:30:ef:ac:40]
            modulus: c6580905fc154509e874ac8f9a1d66aecd589d2293ee2030b1fcc13d7edec3f0db8e51cc64dd041c2889463897e425af9b1db6c1e3a6abcaf84046a0ca3669e5b56211510e62019523312f9a2d20e8fe6cd51ae671dd1a7784652c00e0d91aded77be401fdbf3006162b5202ac014a65ce8780677efffe3c32329974502e0e77e2b994d1a4fae969b535ab7dc98d387dc442ff61d271f20d4d8c98e7318398be733bf11f7573c32368070011292224ae419be1734fdb12c5fcd59e35bfc1dfb82a2cde611f5ccab7dafb22501bd5fb5eaec3cba341e8d19b47139f62112c2dfbdc7ad62aab9e459175962980d8baff0984b0c1aafccd42da5b92ee121c102195
    public exponent: 10001

] 
2022-06-05 06:57:35.940  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 06:57:35.942 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 06:57:35.952 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-05 06:57:35.953 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 06:57:35.953  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-05 06:57:35.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 06:57:35.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 06:57:35.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 06:57:35.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 06:57:35.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 06:57:35.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 06:57:35.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:57:35.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:57:35.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:57:36.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 06:57:36.125  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 06:57:36.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 06:57:36.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:57:36.128  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 06:57:36.129  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 06:57:36.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:57:36.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:57:36.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:57:36.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:57:36.133 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:57:36.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:57:36.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:57:36.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:57:36.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:57:36.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 06:57:36.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:f1:ce:80:5c:74:45:0c:d2:72:11:f6:d1:ed:46:11:aa:06:a8:3e]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 06:59:42.923  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 06:59:42.925 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 06:59:42.927 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 06:59:42.930 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 06:59:42.930  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 06:59:42.931  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 06:59:42.931  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 06:59:42.932 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 06:59:42.932 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 06:59:42.933 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 06:59:42.938 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 06:59:42.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:59:42.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 06:59:42.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:59:43.099  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 06:59:43.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 06:59:43.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 06:59:43.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 06:59:43.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 06:59:43.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 06:59:43.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:59:43.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:59:43.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:59:43.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:59:43.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:59:43.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:59:43.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 06:59:43.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 06:59:43.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 06:59:43.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 06:59:43.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:3d:df:fe:34:fd:3d:ba:46:da:6d:4b:77:32:5f:19:c5:1f:5e:b5]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:03:12.320  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:03:12.324 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:03:12.327 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:03:12.329 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:03:12.329  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:03:12.331  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:03:12.331  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:03:12.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:03:12.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:03:12.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:03:12.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:03:12.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:03:12.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:03:12.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:03:12.483  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:03:12.484  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:03:12.484 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:03:12.484 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:03:12.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:03:12.487  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:03:12.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:03:12.488 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:03:12.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:03:12.490 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:03:12.490 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:03:12.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:03:12.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:03:12.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:03:12.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:03:12.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:03:12.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:38:1d:7f:d4:a3:61:98:1b:ff:12:46:70:67:a9:ce:81:88:f5:ff]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:06:48.162  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:06:48.164 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:06:48.166 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:06:48.167 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:06:48.168  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:06:48.169  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:06:48.170  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:06:48.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:06:48.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:06:48.173 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:06:48.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:06:48.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:06:48.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:06:48.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:06:48.345  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:06:48.346  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:06:48.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:06:48.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:06:48.349  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:06:48.349  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:06:48.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:06:48.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:06:48.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:06:48.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:06:48.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:06:48.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:06:48.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:06:48.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:06:48.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:06:48.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:06:48.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:b0:1d:62:e9:a8:2c:c3:da:bf:88:d9:d4:90:d6:30:ea:5b:82:d1]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:08:47.304  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:08:47.308 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:08:47.311 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:08:47.312 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:08:47.313  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:08:47.314  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:08:47.314  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:08:47.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:08:47.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:08:47.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:08:47.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:08:47.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:08:47.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:08:47.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:08:47.473  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:08:47.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:08:47.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:08:47.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:08:47.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:08:47.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:08:47.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:08:47.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:08:47.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:08:47.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:08:47.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:08:47.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:08:47.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:08:47.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:08:47.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:08:47.494 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:08:47.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:ae:32:73:51:66:61:b7:ff:52:ed:b5:12:a9:ef:fb:a5:3a:66:44]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:11:09.034  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:11:09.035 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:11:09.038 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:11:09.039 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:11:09.039  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:11:09.040  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:11:09.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:11:09.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:11:09.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:11:09.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:11:09.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:11:09.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:11:09.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:11:09.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:11:09.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:11:09.193  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:11:09.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:11:09.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:11:09.196  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:11:09.197  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:11:09.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:11:09.200 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:11:09.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:11:09.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:11:09.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:11:09.205 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:11:09.206 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:11:09.206 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:11:09.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:11:09.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:11:09.219 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:38:d5:5c:0e:6d:47:18:7a:18:c3:90:dc:e0:e6:3d:00:0d:c1:05]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:12:47.475  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:12:47.481 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:12:47.485 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-05 07:12:47.486 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:12:47.486  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-05 07:12:47.487  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:12:47.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:12:47.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:12:47.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:12:47.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:12:47.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:12:47.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:12:47.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:12:47.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:12:47.652  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:12:47.653  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:12:47.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:12:47.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:12:47.656  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:12:47.656  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:12:47.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:12:47.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:12:47.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:12:47.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:12:47.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:12:47.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:12:47.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:12:47.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:12:47.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:12:47.661 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:12:47.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:b2:9e:91:a8:d8:c8:1d:55:1d:68:e2:42:1f:04:5d:78:f2:50:12]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:15:09.743  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:15:09.746 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:15:09.749 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:15:09.750 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:15:09.750  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:15:09.751  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:15:09.752  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:15:09.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:15:09.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:15:09.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:15:09.759 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:15:09.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:15:09.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:15:09.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:15:09.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:15:09.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:15:09.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:15:09.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:15:09.914  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:15:09.915  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:15:09.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:15:09.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:15:09.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:15:09.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:15:09.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:15:09.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:15:09.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:15:09.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:15:09.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:15:09.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:15:09.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:ef:0a:1b:fe:45:2a:7e:68:8f:ca:26:e7:dd:64:ec:2c:ce:aa:54]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:17:46.817  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:17:46.820 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:17:46.826 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-05 07:17:46.828 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:17:46.829  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-05 07:17:46.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:17:46.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:17:46.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:17:46.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:17:46.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:17:46.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:17:46.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:17:46.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:17:46.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:17:46.986  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:17:46.987  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:17:46.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:17:46.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:17:46.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:17:46.990  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:17:46.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:17:46.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:17:46.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:17:46.992 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:17:46.992 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:17:46.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:17:46.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:17:46.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:17:46.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:17:46.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:17:47.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:6b:d2:30:5c:5a:d2:54:80:88:81:b0:ba:c2:1d:5e:e2:de:d3:bf]
            modulus: cf4fdfe3c10436b41caa4b0e832e5584b351f19365aad57fb5f5f74002c20dc641beb85055e801af8878a120adbda212c9e0d051a3473ccc99ed5cf0894a3f39ad561b0bc7e126b08c8c99481565bbf097bf53071dc99698df4ef45f8babdfcff08cd846e7fb5cba0c4a87e9ecd18623e50d1fa452a41481bb046ee160872979b3c5f424127ce9ce20c0f0f32ed2e9041fbd1f0025c84e40bc120d0077bb024d1a848b5b3a88c3f0b66220f4bcb0c20fd6576594fcd4fd65f752c1b2bd0960804cbb49d76471bd859c27ce9050e85b9037324f713fdcbbe1a68957939c88c4e68f748796592d633891a5f081bc1748a8b5a9ac9a71e5862a5b8860023ffdc0ef
    public exponent: 10001

] 
2022-06-05 07:18:03.723  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:18:03.724 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:18:03.726 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-05 07:18:03.726 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:18:03.727  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-05 07:18:03.728  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:18:03.728  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:18:03.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:18:03.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:18:03.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:18:03.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:18:03.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:18:03.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:18:03.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:18:03.863  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:18:03.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:18:03.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:18:03.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:18:03.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:18:03.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:18:03.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:18:03.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:18:03.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:18:03.873 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:18:03.873 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:18:03.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:18:03.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:18:03.875 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:18:03.875 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:18:03.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:18:03.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:34:c1:eb:e1:e2:4f:1d:92:0c:c1:00:c1:83:03:29:69:a3:5e:e6]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:20:30.052  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:20:30.054 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:20:30.056 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:20:30.058 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:20:30.059  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:20:30.060  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:20:30.060  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:20:30.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:20:30.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:20:30.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:20:30.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:20:30.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:20:30.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:20:30.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:20:30.215  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:20:30.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:20:30.217 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:20:30.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:20:30.219  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:20:30.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:20:30.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:20:30.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:20:30.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:20:30.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:20:30.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:20:30.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:20:30.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:20:30.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:20:30.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:20:30.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:20:30.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:49:58:70:88:08:fc:48:50:64:8f:74:db:80:a2:13:13:ac:15:e0]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:24:32.038  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:24:32.042 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:24:32.045 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:24:32.049 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:24:32.050  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:24:32.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:24:32.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:24:32.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:24:32.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:24:32.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:24:32.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:24:32.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:24:32.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:24:32.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:24:32.197  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:24:32.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:24:32.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:24:32.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:24:32.201  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:24:32.201  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:24:32.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:24:32.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:24:32.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:24:32.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:24:32.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:24:32.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:24:32.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:24:32.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:24:32.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:24:32.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:24:32.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:ca:0b:e5:8c:21:21:7e:95:3c:ef:85:9e:4d:d3:9c:1b:2a:5a:2a]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:33:25.180  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:33:25.183 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:33:25.186 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:33:25.188 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:33:25.189  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:33:25.190  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:33:25.190  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:33:25.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:33:25.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:33:25.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:33:25.200 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:33:25.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:33:25.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:33:25.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:33:25.406  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:33:25.407  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:33:25.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:33:25.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:33:25.409  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:33:25.409  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:33:25.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:33:25.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:33:25.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:33:25.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:33:25.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:33:25.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:33:25.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:33:25.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:33:25.413 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:33:25.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:33:25.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:4b:24:a7:8c:b1:09:d7:39:c7:e7:e1:f7:46:28:1c:6d:ab:79:9c]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:37:24.710  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:37:24.713 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:37:24.714 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:37:24.718 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:37:24.719  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:37:24.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:37:24.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:37:24.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:37:24.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:37:24.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:37:24.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:37:24.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:37:24.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:37:24.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:37:24.870  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:37:24.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:37:24.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:37:24.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:37:24.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:37:24.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:37:24.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:37:24.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:37:24.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:37:24.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:37:24.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:37:24.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:37:24.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:37:24.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:37:24.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:37:24.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:37:24.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:12:ed:6a:8a:6f:ba:1e:36:9f:9e:b1:f2:e3:48:9c:61:12:18:60]
            modulus: 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
    public exponent: 10001

] 
2022-06-05 07:46:56.080  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-05 07:46:56.084 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-05 07:46:56.087 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:46:56.089 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 07:46:56.089  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 07:46:56.090  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-05 07:46:56.091  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-05 07:46:56.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-05 07:46:56.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-05 07:46:56.093 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-05 07:46:56.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-05 07:46:56.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:46:56.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-05 07:46:56.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:46:56.276  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-05 07:46:56.277  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-05 07:46:56.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-05 07:46:56.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 07:46:56.279  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-05 07:46:56.280  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-05 07:46:56.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:46:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:46:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:46:56.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:46:56.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:46:56.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:46:56.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 07:46:56.285 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-05 07:46:56.286 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-05 07:46:56.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 07:46:56.292 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497174122579986714430804203936092056190921329452
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 05 05:12:52 UTC 2022
           Final Date: Fri Jun 04 05:12:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae
                       875040a01a01732fbc74161b4c36fff773d2ba35
                       376f926e8c208dd67901fe0415f9f912c1e5df6c
                       16ea7758da1a686536f3d8b26cecb6aa04ed761c
                       dbb174933cd9df45c3b5d48419b170e5af442699
                       730d9e137923b1b699431873dc47f6b6be23df4d
                       a7106aac2bbd0d86f9091af719d523c207befea0
                       3fd64093e5ea4fe527bd4dae588a7e81c7841274
                       b59db69ea6178ec7f0d1436a917244436c3cd86f
                       cdd19db9271787cfcfcbb69bd31b811b10c0ad90
                       8ccd1bfae945e5b92720e453c632ef034b8c1d93
                       6a33ed9b89d55607cf41734982a6655e483decb4
                       9cd1061e2c3ac041e3b5d1e3355404114dd9a48b
                       4e64cb6fd3958a30c4a8a4369090057234777e8c
                       567f8a14ab6d41d69d5dbb0f2c6515e7658b758f
                       a30979305929c5f9e0d9206a654d40850202ee6d
                       6e9d959bbe7a34d420d021805475062d2be2e840
                       9f11ba2f4258b8908fe06e28fa43e060cb76ee10
                       21722d4c9309ed8d00a4b58e176a567aeca96264
                       a76b84c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:a4:b6:f7:b9:2e:fc:a7:01:77:a9:fa:c5:ca:fa:3c:c4:ec:a7:7c]
            modulus: 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
    public exponent: 10001

]