Results

By type

          2022-06-25 05:37:03,530 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-25 05:37:06,933 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-25 05:37:08.604  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 25, 2022 5:37:13 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 25, 2022 5:37:13 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 25, 2022 5:37:13 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 25, 2022 5:37:14 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-25 05:37:15.434 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-25 05:37:16.092  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-25 05:37:16.452  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-25 05:37:17.947 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-25 05:37:17.976 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-25 05:37:17.978 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-25 05:37:17.986 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-25 05:37:18.058 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-25 05:37:18.066 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-25 05:37:18.262 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-25 05:37:19.479 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 25, 2022 5:37:20 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-25 05:37:21.198  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 21.083 seconds (JVM running for 28.384)
Jun 25, 2022 5:37:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-25 06:49:28.246  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 06:49:28.276 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 06:49:28.378 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 06:49:28.389 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 06:49:28.433  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 06:49:28.439  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 06:49:28.442  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 06:49:28.445 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 06:49:28.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:49:28.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 06:49:28.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 06:49:28.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 06:49:28.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 06:49:28.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:49:28.636 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:49:28.651 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:49:29.970  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 06:49:29.977  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 06:49:29.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 06:49:29.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:49:30.014  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 06:49:30.016  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 06:49:30.019 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:49:30.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:49:30.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:49:30.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:49:30.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:49:30.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:49:30.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:49:30.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:49:30.093 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:49:30.097 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 06:49:30.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 91836440057a38bc820a3b845227281f360a462447e60874f78536b7061771d9022e56995329525adb2d5c83981b25f518d5add76e8dd9d54cc5e6c603dd9603ec9f8301c0351b5375efa04a2b3a8856c6bb1c55396dae4f09cfd666a39824e2bdf3e143c4bd3871bab0d520f47ef22b9f07847d51f4fd20f4c51cc1b504efa9fa20c4da986765f5a9d534c89717551289a749339bf49fe37923b6aef948691a7dd9c10a29ac6dbce3c4f4d88ac3d63ca1a45be3e747d53fc8b32fb0de52ed28a01c8c9b3b6b7a743c7092591527de59257a4928ce59b032ba4b3cd5f31c097f598f086a9836302f26059890c9c7f048f02ad79554c932461f645c50c851ea3547e2a2a25b57f69673d47f52d0c4e78de22d92641e996a79d7d2261899a67981936559199f7385088711932f99fba993e44bd967a922c1df644cb9d62a67b9bd8631d321978a112363bff427d885038c0ad1c2fe2062cbd2df1fadc3ee4a1afb5c52d1539af9338501eacd8766e3afb082eda2c1921fe8d924b633cc73100db7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:ca:57:2f:7e:f3:d9:6c:27:09:ce:bc:1b:7a:70:6c:4c:5a:9b:e7]
            modulus: cc466a726801cc9ebb7daa200120db0d0a19a671bed8c6a5f4849dbc469f86b962a83ba0a0ac6e9cfe2bd75c5d43dc4e543a3310984adad67136a4ff57c11c2b7201261d132944f7a6a89682e7426e641b2582d1753b686d01c644d5f5fa6f1774219337ea1e03f9d8fa584c71c4476f2960215dc8cfc7e22b96bf309b3f4c7dbbeecaa288c2edc71c4a4134f370edb776186a83b4cfc40905a946d9656be4075b545f238e0fad288e57b983a32471cb3dad1eab15feaa8810266ddd3818e054c1c1dacc9c7e3546b50a0ef8963376f92945c0dead6ccd2e1d49ba316b4a9a032b2420cdf122105da2368c96ec90e4fde841071aa6389f95a481ecf40050a7e9
    public exponent: 10001

] 
2022-06-25 06:51:11.369  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 06:51:11.379 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 06:51:11.385 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-25 06:51:11.387 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 06:51:11.389  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-25 06:51:11.392  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 06:51:11.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 06:51:11.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 06:51:11.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 06:51:11.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 06:51:11.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 06:51:11.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:51:11.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:51:11.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:51:11.710  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 06:51:11.714  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 06:51:11.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 06:51:11.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:51:11.742  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 06:51:11.743  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 06:51:11.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:51:11.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:51:11.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:51:11.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:51:11.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:51:11.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:51:11.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:51:11.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:51:11.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:51:11.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 06:51:11.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:79:51:fb:75:79:35:eb:df:82:d8:4a:d3:1f:95:c4:0a:6f:23:65]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 06:52:32.039  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 06:52:32.047 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 06:52:32.051 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-25 06:52:32.060 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 06:52:32.062  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-25 06:52:32.074  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 06:52:32.078  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 06:52:32.079 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 06:52:32.080 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 06:52:32.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 06:52:32.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 06:52:32.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:52:32.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:52:32.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:52:32.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 06:52:32.342  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 06:52:32.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 06:52:32.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:52:32.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 06:52:32.373  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 06:52:32.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:52:32.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:52:32.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:52:32.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:52:32.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:52:32.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:52:32.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:52:32.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:52:32.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:52:32.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 06:52:32.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:87:65:fc:9c:b9:99:dd:15:d3:a9:cd:4b:bc:5f:fa:6b:8f:93:7e]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 06:55:18.656  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 06:55:18.663 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 06:55:18.667 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 06:55:18.674 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 06:55:18.676  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 06:55:18.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 06:55:18.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 06:55:18.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 06:55:18.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 06:55:18.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 06:55:18.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 06:55:18.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:55:18.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:55:18.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:55:19.191  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 06:55:19.192  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 06:55:19.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 06:55:19.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:55:19.201  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 06:55:19.208  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 06:55:19.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:55:19.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:55:19.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:55:19.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:55:19.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:55:19.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:55:19.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:55:19.229 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:55:19.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:55:19.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 06:55:19.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:10:b1:7e:c4:71:79:45:6e:26:30:ec:ec:b9:ac:3a:7e:f2:49:21]
            modulus: c5bd8ea2f2a7c1603cab92cc7a48045375662f1fc2409fa8b05a3149caeaed4c92462110a10eb2d192cbfcde7a52008d827bcda7df67846d72f976a9c9174490c8e1f836c7b30ef2971fa191cd5d47196c800086d98c908d795d515b2fa661c7c113f1d93ba57abe96ee9b9cb7c451a14557e13c948a7afd1fc8eaa96a686f7dcc4fe6353ebb1a8c84955de8738a6d7a77d204536857964587f56a2dd4a6048a2f0eedd6556b05b2c9e2659ff56782bde89f0e848fa57c6bca3a7f0150ebcaeb187f0714f9c0419a9aae33cfd56cf180f6b0a21c3fe98ff2004b2adb49c681f79405b8813e4f9b10906e9fa1d3dc035caf54f6f77e3afe6c41074dcabbaf6a8d
    public exponent: 10001

] 
2022-06-25 06:58:59.772  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 06:58:59.777 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 06:58:59.808 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 06:58:59.818 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 06:58:59.819  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 06:58:59.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 06:58:59.822  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 06:58:59.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 06:58:59.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 06:58:59.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 06:58:59.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 06:58:59.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:58:59.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 06:58:59.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:59:00.088  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 06:59:00.090  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 06:59:00.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 06:59:00.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 06:59:00.099  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 06:59:00.099  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 06:59:00.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:59:00.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:59:00.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:59:00.104 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:59:00.104 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:59:00.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:59:00.112 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 06:59:00.113 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 06:59:00.137 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 06:59:00.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 06:59:00.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:16:a5:a5:f5:4a:2a:cb:cb:cf:54:56:02:4f:bd:99:b2:7d:f6:86]
            modulus: ce54cae81f34a85dc65c8963ce1ddd3368d95bfa828f3bd457a82fa6e5759839438b17bfb098bcffe5fcd1d1e226e20b409a212f464508346061e87d9f32366c14a28b261ffd90b2bf8a5a3c32ec3521244b728af9a98e7ef3e4bcdfaa9a39c157f92c1c66f0eb2924923045f08dee2d56b4ee4d4d9695a94e410e8a789c90357390753dfa426d3adb3fcd652d8474c528a0bf7c04d52211b42867c3ce64bcded4dd81e14ec11fc919e2edc31e567709c51516ec3a1a7eb00e42feb78046f85f41b1a9fc771f43ebb2280ccf06eb1ee3ef55f9a0d003bdd8c9700abc454e4bc11c0b887e983a401df1003cc81138853b22f54deb28a5d975c5d66f804eccb39d
    public exponent: 10001

] 
2022-06-25 07:04:30.429  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:04:30.433 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:04:30.436 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:04:30.440 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:04:30.442  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:04:30.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:04:30.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:04:30.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:04:30.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:04:30.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:04:30.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:04:30.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:04:30.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:04:30.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:04:30.805  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:04:30.806  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:04:30.807 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:04:30.807 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:04:30.810  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:04:30.811  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:04:30.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:04:30.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:04:30.818 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:04:30.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:04:30.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:04:30.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:04:30.832 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:04:30.834 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:04:30.835 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:04:30.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:04:30.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 91836440057a38bc820a3b845227281f360a462447e60874f78536b7061771d9022e56995329525adb2d5c83981b25f518d5add76e8dd9d54cc5e6c603dd9603ec9f8301c0351b5375efa04a2b3a8856c6bb1c55396dae4f09cfd666a39824e2bdf3e143c4bd3871bab0d520f47ef22b9f07847d51f4fd20f4c51cc1b504efa9fa20c4da986765f5a9d534c89717551289a749339bf49fe37923b6aef948691a7dd9c10a29ac6dbce3c4f4d88ac3d63ca1a45be3e747d53fc8b32fb0de52ed28a01c8c9b3b6b7a743c7092591527de59257a4928ce59b032ba4b3cd5f31c097f598f086a9836302f26059890c9c7f048f02ad79554c932461f645c50c851ea3547e2a2a25b57f69673d47f52d0c4e78de22d92641e996a79d7d2261899a67981936559199f7385088711932f99fba993e44bd967a922c1df644cb9d62a67b9bd8631d321978a112363bff427d885038c0ad1c2fe2062cbd2df1fadc3ee4a1afb5c52d1539af9338501eacd8766e3afb082eda2c1921fe8d924b633cc73100db7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:07:24:f5:4f:49:57:5e:aa:d0:bd:26:1e:a1:f9:07:2b:cd:70:e6]
            modulus: d70a9e5ff492c82f7e93ca4d226308d34e8d0ed3a0b5a1a2ee2eedd16eee7662fae7003c1d1605eaa27aeea35e61c9612aacf061190925d4390fdb3821e1fb3234296217fdc5df7fc08b3f2a51d72824aac10ff0e4decdc8e39582fcda55d174677466e5883ba15d3c0ba5ed8cea38aa39363336ae5afdb57e6339df870190586da9faa97aca3c99a8f9446a460d07ff8eeeca0e7e9b437cba0869c3d7dc7fb5e6a782cd07b4958614ae609452234ef5b7590e2f542073c8476c5528bb8dbcaad3f14bacbb9c7643a233e674c15dbe0b14923e13f3d98c56ee8ed8d03448113c5b493b3f8fbf6b9d2c20817c0502cf857595f1af8a4103e10b4b91e54d22db39
    public exponent: 10001

] 
2022-06-25 07:09:51.281  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:09:51.283 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:09:51.286 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:09:51.287 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:09:51.288  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:09:51.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:09:51.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:09:51.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:09:51.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:09:51.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:09:51.301 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:09:51.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:09:51.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:09:51.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:09:51.539  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:09:51.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:09:51.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:09:51.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:09:51.544  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:09:51.545  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:09:51.545 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:09:51.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:09:51.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:09:51.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:09:51.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:09:51.549 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:09:51.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:09:51.551 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:09:51.551 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:09:51.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:09:51.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:4c:ac:70:d2:1d:b0:b0:3b:58:54:44:54:9a:ca:9b:c2:77:55:ba]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 07:13:46.580  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:13:46.589 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:13:46.593 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:13:46.594 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:13:46.595  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:13:46.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:13:46.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:13:46.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:13:46.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:13:46.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:13:46.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:13:46.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:13:46.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:13:46.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:13:46.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:13:46.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:13:46.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:13:46.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:13:46.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:13:46.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:13:46.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:13:46.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:13:46.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:13:46.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:13:46.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:13:46.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:13:46.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:13:46.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:13:46.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:13:46.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:13:46.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:e8:be:b0:11:62:de:c5:e7:5b:1b:77:8a:2d:f1:2a:f6:46:3d:af]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 07:14:34.790  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:14:34.792 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:14:34.796 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-25 07:14:34.798 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:14:34.798  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-25 07:14:34.799  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:14:34.800  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:14:34.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:14:34.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:14:34.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:14:34.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:14:34.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:14:34.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:14:34.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:14:35.058  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:14:35.059  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:14:35.059 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:14:35.060 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:14:35.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:14:35.065  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:14:35.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:14:35.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:14:35.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:14:35.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:14:35.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:14:35.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:14:35.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:14:35.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:14:35.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:14:35.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:14:35.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:e7:74:e7:47:f8:87:42:05:96:a6:98:ca:ea:c9:e8:e3:0c:1d:d9]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 07:18:06.604  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:18:06.607 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:18:06.610 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:18:06.613 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:18:06.613  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:18:06.616  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:18:06.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:18:06.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:18:06.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:18:06.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:18:06.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:18:06.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:18:06.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:18:06.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:18:06.920  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:18:06.921  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:18:06.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:18:06.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:18:06.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:18:06.929  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:18:06.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:18:06.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:18:06.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:18:06.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:18:06.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:18:06.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:18:06.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:18:06.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:18:06.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:18:06.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:18:06.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:d2:7a:fb:61:12:a8:b1:ad:ba:a6:44:48:54:7f:77:df:0c:c1:b7]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 07:21:29.476  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:21:29.483 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:21:29.488 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-25 07:21:29.491 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:21:29.492  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-25 07:21:29.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:21:29.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:21:29.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:21:29.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:21:29.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:21:29.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:21:29.510 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:21:29.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:21:29.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:21:29.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:21:29.736  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:21:29.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:21:29.737 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:21:29.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:21:29.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:21:29.740 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:21:29.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:21:29.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:21:29.742 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:21:29.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:21:29.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:21:29.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:21:29.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:21:29.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:21:29.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:21:29.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:c3:ba:e6:7f:ce:39:22:63:4e:95:29:47:8d:28:71:cc:ae:ee:d3]
            modulus: b14b52c8a7de8454cef975a9b8a88862fa37f1d2fc371f872b4f4c04a4b3ae810f0afcdc22d11392701ba9aeb246272893a77bba6c38b066bd3793491b7fc5ffa39040ee6f81efac57462a81e14b8390c99a720d90cfe7dd18668965b342393bbad92ae8cead19fdf39024b5a2402d8e1e489466505f63ee022bb1d36c217d99c0f09166a45d9e522b40cdbcfc91ad8ccd8ecee6b72df5178fbb699517b23790236a0b17c21498ddf5a19440191897cbeb9fd83e5c5c236359c66b3273e88d15561875cad786e4b88504ea19bf115aad5855b6a0bfc7a91f41155e79a4a646b3ca1c6193f465502db41e4180af08fbb368eb623b52fc8e229fef99769cafd0a3
    public exponent: 10001

] 
2022-06-25 07:21:54.570  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:21:54.572 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:21:54.575 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-25 07:21:54.576 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:21:54.577  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-25 07:21:54.578  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:21:54.579  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:21:54.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:21:54.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:21:54.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:21:54.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:21:54.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:21:54.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:21:54.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:21:54.832  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:21:54.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:21:54.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:21:54.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:21:54.837  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:21:54.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:21:54.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:21:54.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:21:54.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:21:54.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:21:54.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:21:54.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:21:54.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:21:54.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:21:54.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:21:54.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:21:54.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:ad:52:02:3d:6b:bc:1f:33:76:a6:17:67:2d:7f:08:cc:41:6c:6b]
            modulus: ead522d38fe9060ee3a2cdc01e316d0f9c2db6cb765bc5c11ba3e1951cbb0a6a9791885e0781983f2c3fadb54c771552df3d1b00ff3beaedce10e1bc1657a1b55ec38fcbd6e490e60f1e04b886778849d12445c17a81ac1b0adb916ea357a0e49b828471891838931392e388a7dedb6947a2a6710e474de38590f20852fea32fde0f77b14d514b44a97851ff328a62315c8b53cbd718323e826db399351672bfd9064c9eac43b73b9261b0618316cba407fe559da26dfc6eb960266fc086a0d71a86fd87360832a2b53d6096aa088b638e9b14c3e24aa3f14169fb637c21300ef09c17b5391ae165987dea770e8c2caf0483f11dd9b5609dd6a79b25868eb1a1
    public exponent: 10001

] 
2022-06-25 07:22:00.855  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:22:00.858 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:22:00.871 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:22:00.872 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:22:00.879  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:22:00.891  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:22:00.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:22:00.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:22:00.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:22:00.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:22:00.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:22:00.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:22:00.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:22:00.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:22:01.171  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:22:01.171  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:22:01.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:22:01.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:22:01.178  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:22:01.178  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:22:01.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:22:01.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:22:01.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:22:01.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:22:01.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:22:01.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:22:01.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:22:01.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:22:01.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:22:01.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:22:01.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:dc:fd:a0:cd:38:bb:d6:9c:7a:91:9d:05:03:5a:db:ba:94:68:63]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 07:26:21.870  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 07:26:21.874 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 07:26:21.883 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:26:21.888 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 07:26:21.889  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 07:26:21.891  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 07:26:21.892  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 07:26:21.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 07:26:21.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 07:26:21.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 07:26:21.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 07:26:21.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:26:21.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 07:26:21.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:26:22.187  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 07:26:22.188  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 07:26:22.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 07:26:22.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 07:26:22.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 07:26:22.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 07:26:22.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:26:22.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:26:22.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:26:22.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:26:22.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:26:22.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:26:22.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 07:26:22.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 07:26:22.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 07:26:22.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 07:26:22.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 320411863689512353046447136029945224874551976303
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 05:11:29 UTC 2022
           Final Date: Thu Jun 24 05:11:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:53:c3:36:d2:bd:4f:f5:06:87:b6:1b:b3:1c:f9:2e:6b:9a:08:47]
            modulus: 91836440057a38bc820a3b845227281f360a462447e60874f78536b7061771d9022e56995329525adb2d5c83981b25f518d5add76e8dd9d54cc5e6c603dd9603ec9f8301c0351b5375efa04a2b3a8856c6bb1c55396dae4f09cfd666a39824e2bdf3e143c4bd3871bab0d520f47ef22b9f07847d51f4fd20f4c51cc1b504efa9fa20c4da986765f5a9d534c89717551289a749339bf49fe37923b6aef948691a7dd9c10a29ac6dbce3c4f4d88ac3d63ca1a45be3e747d53fc8b32fb0de52ed28a01c8c9b3b6b7a743c7092591527de59257a4928ce59b032ba4b3cd5f31c097f598f086a9836302f26059890c9c7f048f02ad79554c932461f645c50c851ea3547e2a2a25b57f69673d47f52d0c4e78de22d92641e996a79d7d2261899a67981936559199f7385088711932f99fba993e44bd967a922c1df644cb9d62a67b9bd8631d321978a112363bff427d885038c0ad1c2fe2062cbd2df1fadc3ee4a1afb5c52d1539af9338501eacd8766e3afb082eda2c1921fe8d924b633cc73100db7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bd1c923c227d6e1a9b57f09c8ce4f40fc30fd61
                       1f1b456bbfd6f2ea3bfeebf2a18972391eca549a
                       a7947bdfc783893b50fe86dcaef311f3c155e9e3
                       bbbcb5b66c7bdbe50f54d9754d2e97d8cc60c0d0
                       81e80c497b5df5fa5c16442a3c8dc7de58ceec07
                       2ee11fbceba09473439f72cc64c6b5192982e6f4
                       fdbe66fb6987704504a7065a0958e87a885c1bb8
                       7f5ce1837ad2e6552b6e1d5890ccbceccafcf157
                       bd768570822394e5229e4fc07d195a3cff9eea7b
                       ca67fb444d430f0290b7cd44d5416e8c80091b1f
                       4a3535246b3ff543771ac54a0d230f16d06b4022
                       ecb2c4841faef43b17311f0afdf58a7e8bafe3ea
                       727814187cf166310733b318cc3a29b88e9c67a5
                       9af7a6ae150838d449b744adf170eb6100079a81
                       6e392bfac6884c2de580f32022d67dd3544be5cf
                       987280a2eb9fa35da33502443ce1946ff609401a
                       cb24e420839f364f874338874164adc0bf33ce7c
                       c4704ecfcad77ddfd65f18336bafe892e1e7683a
                       07fa651ca5c2b5fccc19f3b1e266f70690202533
                       1d8db327
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:f7:55:87:20:7e:ff:ea:20:65:7a:59:87:64:3d:fa:49:11:a7:34]
            modulus: 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
    public exponent: 10001

]