Results

By type

          2022-06-10 05:28:24,603 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-10 05:28:28,189 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-10 05:28:30.176  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 10, 2022 5:28:35 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 10, 2022 5:28:35 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 10, 2022 5:28:35 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 10, 2022 5:28:35 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-10 05:28:36.618 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-10 05:28:37.147  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-10 05:28:37.570  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-10 05:28:39.280 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-10 05:28:39.285 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-10 05:28:39.288 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-10 05:28:39.297 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-10 05:28:39.388 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-10 05:28:39.403 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-10 05:28:39.748 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-10 05:28:41.476 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 10, 2022 5:28:42 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-10 05:28:43.527  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 26.423 seconds (JVM running for 37.278)
Jun 10, 2022 5:28:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-10 07:30:05.352  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:30:05.368 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:30:05.432 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:30:05.440 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:30:05.470  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:30:05.474  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:30:05.476  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:30:05.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:30:05.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:30:05.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:30:05.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:30:05.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:30:05.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:30:05.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:30:05.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:30:05.580 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:30:06.574  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:30:06.581  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:30:06.581 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:30:06.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:30:06.596  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:30:06.598  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:30:06.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:30:06.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:30:06.600 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:30:06.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:30:06.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:30:06.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:30:06.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:30:06.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:30:06.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:30:06.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:30:06.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:1a:cc:da:e1:a1:1c:90:df:a2:0b:63:68:1a:b6:71:c0:ed:56:90]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:32:10.513  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:32:10.519 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:32:10.526 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-10 07:32:10.555 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:32:10.557  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-10 07:32:10.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:32:10.566  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:32:10.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:32:10.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:32:10.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:32:10.600 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:32:10.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:32:10.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:32:10.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:32:10.862  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:32:10.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:32:10.883 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:32:10.884 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:32:10.908  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:32:10.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:32:10.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:32:10.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:32:10.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:32:10.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:32:10.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:32:10.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:32:10.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:32:10.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:32:10.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:32:10.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:32:10.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:a0:5a:e5:58:5f:60:c1:fe:15:34:36:05:b9:72:d3:54:69:d7:08]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:34:11.710  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:34:11.714 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:34:11.717 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-10 07:34:11.719 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:34:11.720  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-10 07:34:11.724  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:34:11.725  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:34:11.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:34:11.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:34:11.728 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:34:11.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:34:11.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:34:11.748 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:34:11.748 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:34:11.938  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:34:11.940  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:34:11.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:34:11.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:34:11.945  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:34:11.945  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:34:11.946 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:34:11.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:34:11.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:34:11.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:34:11.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:34:11.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:34:11.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:34:11.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:34:11.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:34:11.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:34:11.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:4a:09:09:80:a4:03:45:af:ba:87:c6:91:bf:ef:eb:14:26:3b:a2]
            modulus: b768c6d8f5553df51912c4bc43f19cf37c8fa92e1a53403bfbd88178036e2d09b28f6829feea9c24f8aeb29462b729165ef704e44365dcc512e5ba26f3600b5a8ed3de69bf32b430778df2e59e159c5011748869ffc35ac7a8e2e6c1154fc2ca390b7dbcba513cf503b62cfbc18d6526aa6fa8ff07fdc7e3e9b5612a6605fcc3b0bd3cd2c0158a074ab0e31ecf2fdc5e8830c2595dc548918cd847de18c4388a114e2fe6bfd9c3e717f8eecbbd759a8bd071c8d4598da16a92587afb81d583db68ffbd4f62d8b0a7347079862d5099aadea662fc027c4a6a929b020fe9bf693e96aee26c17d5218cfdb93e9c44e574d81600e7dd1bd33265f83cc4f252644b25
    public exponent: 10001

] 
2022-06-10 07:36:40.915  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:36:40.917 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:36:40.919 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:36:40.921 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:36:40.922  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:36:40.931  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:36:40.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:36:40.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:36:40.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:36:40.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:36:40.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:36:40.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:36:40.947 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:36:40.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:36:41.180  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:36:41.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:36:41.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:36:41.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:36:41.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:36:41.197  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:36:41.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:36:41.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:36:41.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:36:41.210 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:36:41.213 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:36:41.213 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:36:41.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:36:41.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:36:41.218 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:36:41.220 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:36:41.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:94:92:c8:83:6a:ba:64:07:fc:00:5c:83:9a:af:1e:4f:20:96:4e]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:41:05.418  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:41:05.423 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:41:05.427 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:41:05.428 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:41:05.429  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:41:05.432  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:41:05.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:41:05.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:41:05.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:41:05.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:41:05.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:41:05.454 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:41:05.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:41:05.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:41:05.702  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:41:05.703  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:41:05.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:41:05.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:41:05.707  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:41:05.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:41:05.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:41:05.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:41:05.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:41:05.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:41:05.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:41:05.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:41:05.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:41:05.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:41:05.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:41:05.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:41:05.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:30:d1:0c:e7:a5:18:9a:a4:11:22:24:31:a7:0c:1a:26:71:67:06]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:47:28.776  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:47:28.779 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:47:28.782 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:47:28.784 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:47:28.784  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:47:28.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:47:28.786  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:47:28.787 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:47:28.787 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:47:28.788 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:47:28.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:47:28.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:47:28.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:47:28.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:47:29.019  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:47:29.020  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:47:29.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:47:29.021 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:47:29.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:47:29.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:47:29.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:47:29.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:47:29.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:47:29.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:47:29.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:47:29.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:47:29.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:47:29.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:47:29.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:47:29.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:47:29.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:0f:4e:c5:ae:7b:96:46:cc:2a:d1:d7:b0:df:39:87:d2:a8:50:05]
            modulus: a92f01245e7c72550a1f98d2b998f5a6914362806d548a3c9c9a2fdf2b63a33a14826f00d4faa3af6c59fd49b3d6cc44e73c4ad3aee95e1cb44ca1487bf0091ee7fa0f4c61fb87784dea24d95b86d83d08ed14b0b490afac7531d99ff20ab17786b7585474599b7f0b8cec3bee9d39e123bcdf43a4e94139105f08c93b81b4d7519b54e6f0a74060cd49ae403a12f69825ce94bc67e90d2cb4f2706420689b3354552e4bef087c175c7f39a066830d605cf8e99cd6f5719dd339e5e8b5e5a5f78ec607340f25382df39bb8f8c789a222fb5accd19521006dbf3d4913eb73c44185658515e0a1b501c788009b7e1ffc29459a1db1a58acd563df4a2f417377c3d
    public exponent: 10001

] 
2022-06-10 07:51:08.971  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:51:08.975 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:51:08.979 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-10 07:51:08.981 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:51:08.982  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-10 07:51:08.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:51:08.985  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:51:08.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:51:08.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:51:08.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:51:09.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:51:09.007 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:51:09.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:51:09.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:51:09.330  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:51:09.331  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:51:09.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:51:09.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:51:09.334  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:51:09.334  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:51:09.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:51:09.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:51:09.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:51:09.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:51:09.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:51:09.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:51:09.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:51:09.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:51:09.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:51:09.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:51:09.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:e6:7f:7a:9d:13:88:e5:4f:95:ab:86:82:74:aa:6d:08:c8:af:a3]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:52:39.840  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:52:39.842 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:52:39.844 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:52:39.845 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:52:39.847  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:52:39.848  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:52:39.848  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:52:39.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:52:39.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:52:39.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:52:39.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:52:39.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:52:39.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:52:39.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:52:40.128  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:52:40.129  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:52:40.129 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:52:40.130 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:52:40.132  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:52:40.133  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:52:40.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:52:40.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:52:40.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:52:40.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:52:40.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:52:40.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:52:40.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:52:40.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:52:40.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:52:40.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:52:40.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:c3:e7:67:85:8e:78:76:d6:8b:6b:be:26:51:4a:ad:5f:01:33:4b]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:56:45.784  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:56:45.787 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:56:45.791 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:56:45.794 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:56:45.794  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 07:56:45.795  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:56:45.796  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:56:45.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:56:45.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:56:45.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:56:45.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:56:45.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:56:45.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:56:45.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:56:46.038  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:56:46.039  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:56:46.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:56:46.040 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:56:46.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:56:46.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:56:46.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:56:46.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:56:46.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:56:46.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:56:46.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:56:46.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:56:46.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:56:46.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:56:46.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:56:46.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:56:46.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:5d:95:f8:fb:8f:30:14:c3:d5:ba:68:39:09:23:2d:78:79:95:1d]
            modulus: d563d7a6e4cff23b6734eb50575c3d912ece52fa9b63bcf66167febbab963aa8199e8df9f10efbc8844a2d44526254fc452d2477adddca6def960de2156c2f3f9f05677ff8adda7044324fed8a9146d5ca529ad1394c5ce3345041ee572e5df0d085dcff0a14ba18900504ee3618ec4fce0bbb9d9b395bbbcb28ab5d793d24e0fdb63f120bcdce784a2beedae682aa1010731b2d67f9b3a3a7a0b893064768e8b6f335256d92ae23e39db31f70bf6962c504e3547649a21c2b94589296e0fea4ae71bb810527e6c704364500b60856ed6a0ef1a5d9199d7a89ec6b8e6fbaa0159dab4fdb74946ff0320be994af9ca9eaca30c585ec0d7ef61955d273ce58f073
    public exponent: 10001

] 
2022-06-10 07:57:48.448  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:57:48.450 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:57:48.452 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-10 07:57:48.453 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:57:48.453  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-10 07:57:48.455  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:57:48.456  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:57:48.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:57:48.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:57:48.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:57:48.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:57:48.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:57:48.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:57:48.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:57:48.729  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:57:48.730  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:57:48.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:57:48.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:57:48.733  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:57:48.733  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:57:48.734 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:57:48.734 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:57:48.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:57:48.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:57:48.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:57:48.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:57:48.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:57:48.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:57:48.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:57:48.740 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:57:48.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:66:41:95:26:41:9c:80:26:9a:23:1b:c7:f3:73:97:77:4a:f1:2b]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 07:58:10.131  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 07:58:10.133 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 07:58:10.135 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-10 07:58:10.135 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 07:58:10.136  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-10 07:58:10.137  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 07:58:10.137  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 07:58:10.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 07:58:10.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 07:58:10.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 07:58:10.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 07:58:10.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:58:10.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 07:58:10.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:58:10.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 07:58:10.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 07:58:10.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 07:58:10.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 07:58:10.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 07:58:10.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 07:58:10.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:58:10.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:58:10.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:58:10.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:58:10.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:58:10.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:58:10.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 07:58:10.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 07:58:10.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 07:58:10.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 07:58:10.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:42:b9:7b:5b:86:1b:ac:43:b7:2e:bf:fa:d1:a5:ea:2e:1d:06:fd]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 08:01:44.737  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 08:01:44.739 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 08:01:44.745 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:01:44.746 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 08:01:44.747  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:01:44.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 08:01:44.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 08:01:44.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 08:01:44.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 08:01:44.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 08:01:44.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 08:01:44.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:01:44.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:01:44.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:01:44.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 08:01:44.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 08:01:44.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 08:01:44.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:01:44.944  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 08:01:44.945  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 08:01:44.945 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:01:44.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:01:44.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:01:44.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:01:44.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:01:44.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:01:44.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:01:44.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:01:44.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:01:44.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 08:01:44.956 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:56:32:e9:c2:5d:98:95:42:3f:f4:f3:03:d7:8e:72:f4:c6:76:75]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 08:05:44.501  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 08:05:44.505 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 08:05:44.508 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:05:44.510 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 08:05:44.511  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:05:44.512  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 08:05:44.512  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 08:05:44.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 08:05:44.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 08:05:44.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 08:05:44.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 08:05:44.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:05:44.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:05:44.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:05:44.800  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 08:05:44.800  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 08:05:44.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 08:05:44.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:05:44.803  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 08:05:44.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 08:05:44.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:05:44.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:05:44.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:05:44.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:05:44.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:05:44.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:05:44.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:05:44.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:05:44.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:05:44.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 08:05:44.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:21:16:0c:47:47:e5:ee:3a:3e:ad:35:e5:29:b6:6f:15:92:7b:84]
            modulus: c2168fbcb73d22dd01614619d6c8c272d95d07c9f0bae19c200cf39a6bc4a915483f076701bf3bd207748c0fda487ec37d2eb78679b80818379baf75130e38645d598f78c0a326b8ade1e7f0b2b9fffad484ae78e72e3fc293bdc6f0f76e42558b1ffdfaa60672514e49e0af97757a2e15538dfe426c6513c6cea832a0743585d982522d902bb893d090a031afd08e675a06097fd7751280dbd459a67f972ee62fb468060265cbe7670599ed8188f602acadcb0d6e40d47bff83efbcc8b242fda40a9a1522cb11fd55fc4522b52e3c3c934471e466bd9ccfb8aa04cf076641f6442328eea0b764468e4b0990de6809a23d874952f5806bf643236eabed33c82b
    public exponent: 10001

] 
2022-06-10 08:11:15.927  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 08:11:15.930 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 08:11:15.933 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:11:15.937 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 08:11:15.937  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:11:15.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 08:11:15.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 08:11:15.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 08:11:15.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 08:11:15.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 08:11:15.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 08:11:15.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:11:15.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:11:15.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:11:16.176  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 08:11:16.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 08:11:16.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 08:11:16.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:11:16.180  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 08:11:16.180  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 08:11:16.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:11:16.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:11:16.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:11:16.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:11:16.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:11:16.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:11:16.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:11:16.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:11:16.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:11:16.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 08:11:16.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:ad:3e:f1:6b:67:a3:9d:6c:66:89:ae:ab:55:86:ef:f6:30:ee:69]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 08:15:36.210  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 08:15:36.212 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 08:15:36.214 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:15:36.215 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 08:15:36.215  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:15:36.216  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 08:15:36.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 08:15:36.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 08:15:36.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 08:15:36.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 08:15:36.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 08:15:36.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:15:36.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:15:36.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:15:36.465  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 08:15:36.465  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 08:15:36.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 08:15:36.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:15:36.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 08:15:36.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 08:15:36.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:15:36.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:15:36.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:15:36.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:15:36.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:15:36.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:15:36.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:15:36.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:15:36.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:15:36.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 08:15:36.486 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:cb:64:3d:57:23:b0:4b:6f:14:10:0c:4e:d1:de:2a:2d:39:78:07]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 08:20:48.370  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 08:20:48.376 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 08:20:48.378 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:20:48.380 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 08:20:48.382  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 08:20:48.384  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 08:20:48.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 08:20:48.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 08:20:48.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 08:20:48.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 08:20:48.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 08:20:48.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:20:48.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 08:20:48.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:20:48.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 08:20:48.617  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 08:20:48.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 08:20:48.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 08:20:48.620  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 08:20:48.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 08:20:48.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:20:48.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:20:48.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:20:48.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:20:48.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:20:48.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:20:48.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 08:20:48.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 08:20:48.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 08:20:48.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 08:20:48.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 652654431014641216765829318789110903761151737549
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 05:10:27 UTC 2022
           Final Date: Wed Jun 09 05:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32926e47f2252faf32c81500ae753fb429fdccfa
                       ad051011d2ad5341cb5176244b13e2f76482fc1e
                       38689b4f46c890ae44ee576190ec38624d497c69
                       237604969edb641439efdbe91ae2a1894b375327
                       b6c289c492cb44c91db3392ea174379f3d067846
                       58cc3d12c03968dc437d326d50f01af346b31629
                       9e4c4e91b1f03765334ce17920cd4432dbafc97f
                       cf639ce1b1ad505bf3c1311d241af7f9227729fa
                       63d406623fa0f6452d0431e98e45dce6d41a1523
                       91e0a3988739a69b799b932ab94afada4d292e35
                       6364df9c28ac1ac48e8dfb54b8f136b172ae118a
                       60515a5bea8784174f8b36e21809d1594ab40818
                       f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a
                       e6419bfafdb8debc699928467bfc4ee6e5dba4ce
                       facc783a025be6b4c61cb412837f22efb61847cb
                       1c9d36bee4ad4ba25be2b2bb88623118be419400
                       f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04
                       e03729c40f12e20aef38d7700f3ae46499c45cd0
                       81b772ec7c6de9d77e69cf6cb06a831fb907984d
                       43a32d14
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:57:d8:84:03:74:21:d2:e5:91:32:f2:f5:76:d8:a2:1b:40:45:3b]
            modulus: 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
    public exponent: 10001

]