Results

By type

          2022-07-16 05:35:12,668 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-16 05:35:13,786 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-16 05:35:14.676  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 16, 2022 5:35:16 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 16, 2022 5:35:16 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 16, 2022 5:35:16 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 16, 2022 5:35:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-16 05:35:17.536 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-16 05:35:17.826  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-16 05:35:17.994  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-16 05:35:18.762 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-16 05:35:18.765 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-07-16 05:35:18.767 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-16 05:35:18.770 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-16 05:35:18.827 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-16 05:35:18.832 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-16 05:35:18.974 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-16 05:35:19.655 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 16, 2022 5:35:20 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-16 05:35:20.601  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.881 seconds (JVM running for 10.681)
Jul 16, 2022 5:35:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-16 05:36:08.700  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 05:36:08.710 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 05:36:08.754 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-16 05:36:08.759 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 05:36:08.782  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-16 05:36:08.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 05:36:08.787  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 05:36:08.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 05:36:08.791 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 05:36:08.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 05:36:08.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 05:36:08.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 05:36:08.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 05:36:08.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 05:36:08.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 05:36:08.866 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 05:36:10.279  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 05:36:10.282  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 05:36:10.283 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 05:36:10.285 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 05:36:10.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 05:36:10.298  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 05:36:10.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 05:36:10.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 05:36:10.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 05:36:10.313 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 05:36:10.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 05:36:10.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 05:36:10.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 05:36:10.323 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 05:36:10.323 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 05:36:10.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 05:36:10.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:3e:48:9d:89:25:10:ee:50:1f:b1:98:b8:78:51:8a:0f:3c:56:7f]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:01:10.045  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:01:10.048 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:01:10.052 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:01:10.054 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:01:10.056  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:01:10.057  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:01:10.058  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:01:10.059 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:01:10.060 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:01:10.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:01:10.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:01:10.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:01:10.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:01:10.075 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:01:11.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:01:11.300  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:01:11.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:01:11.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:01:11.305  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:01:11.306  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:01:11.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:01:11.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:01:11.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:01:11.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:01:11.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:01:11.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:01:11.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:01:11.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:01:11.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:01:11.313 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:01:11.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:40:e8:15:31:cd:0d:07:24:7b:70:4a:31:21:ba:19:ca:71:a6:bd]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:02:58.830  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:02:58.832 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:02:58.834 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-16 07:02:58.835 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:02:58.836  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-16 07:02:58.837  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:02:58.837  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:02:58.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:02:58.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:02:58.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:02:58.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:02:58.854 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:02:58.855 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:02:58.855 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:02:59.356  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:02:59.358  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:02:59.359 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:02:59.359 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:02:59.364  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:02:59.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:02:59.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:02:59.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:02:59.367 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:02:59.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:02:59.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:02:59.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:02:59.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:02:59.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:02:59.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:02:59.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:02:59.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:a0:06:7e:50:80:04:c8:01:6b:bc:89:9f:66:66:fa:d4:a5:23:39]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:04:51.578  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:04:51.582 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:04:51.585 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-16 07:04:51.586 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:04:51.587  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-16 07:04:51.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:04:51.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:04:51.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:04:51.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:04:51.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:04:51.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:04:51.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:04:51.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:04:51.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:04:52.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:04:52.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:04:52.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:04:52.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:04:52.029  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:04:52.030  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:04:52.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:04:52.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:04:52.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:04:52.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:04:52.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:04:52.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:04:52.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:04:52.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:04:52.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:04:52.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:04:52.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:8b:5b:f5:bc:90:04:5e:f7:82:71:c7:0d:f0:f1:49:af:71:10:f9]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:07:34.371  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:07:34.374 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:07:34.375 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:07:34.377 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:07:34.378  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:07:34.380  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:07:34.382  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:07:34.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:07:34.383 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:07:34.383 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:07:34.389 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:07:34.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:07:34.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:07:34.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:07:35.543  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:07:35.544  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:07:35.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:07:35.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:07:35.548  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:07:35.549  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:07:35.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:07:35.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:07:35.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:07:35.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:07:35.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:07:35.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:07:35.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:07:35.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:07:35.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:07:35.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:07:35.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: ab01c7b8a39cb67848e29365e5e7e82b0b8a270b2e990e0e8aef68ce00560e9ee37c7c6aed8d931a54bebaf9abf84e6990a304079c7579f4b32f533af0b3258ceb1c89c121992b00d37bce93efd0176662aaa02001d994f697e1f8c73240a71fded88233d52f3a8cbadbac5d0698703e19a575edb090dffeb23fab0c4998f2ec7a0b014630244c43491b21d7c194048c86af0fba39ba91700c43ccef425f66b661fe432231272878602f33d94f37fa5641d3a2e9567837322b31aeb546af50e074bd7532284e47733f96f1514fa8a2a7e1f8ae41059cb31a6952de40fb10665307d1f7937a9c8487d0d481dd990f73dfd0116f82b8f1a5595bcf443c48f49b41908704116d496dbb56472266f2474128e7730fc8cd71d29db0a82deb9413a35593c61f7e013712ed1f6575e8fb89aaefce753c98e96cd10ca066c2b82df9eafc137ba9a130046b1e18c0102ce0670e5a2941cb4bc118885aff296625a5a26294a8e7bdee7e9f6bd027bfbd05924a444eaeb979811298c905f530465775d7198d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:57:45:62:fa:2c:62:01:53:bc:9a:56:a9:cb:a5:a7:b1:bc:f3:57]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:11:42.228  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:11:42.230 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:11:42.238 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:11:42.240 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:11:42.241  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:11:42.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:11:42.242  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:11:42.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:11:42.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:11:42.243 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:11:42.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:11:42.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:11:42.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:11:42.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:11:43.080  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:11:43.081  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:11:43.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:11:43.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:11:43.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:11:43.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:11:43.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:11:43.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:11:43.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:11:43.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:11:43.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:11:43.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:11:43.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:11:43.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:11:43.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:11:43.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:11:43.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:43:b0:ca:28:c5:3e:c2:66:a4:b3:35:19:53:ad:45:c8:6c:a2:9f]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:17:06.206  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:17:06.207 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:17:06.209 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:17:06.209 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:17:06.210  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:17:06.210  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:17:06.211  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:17:06.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:17:06.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:17:06.212 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:17:06.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:17:06.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:17:06.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:17:06.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:17:06.624  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:17:06.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:17:06.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:17:06.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:17:06.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:17:06.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:17:06.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:17:06.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:17:06.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:17:06.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:17:06.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:17:06.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:17:06.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:17:06.633 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:17:06.633 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:17:06.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:17:06.641 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:ad:f1:ca:0e:3f:df:63:71:42:6b:76:11:36:92:c7:62:bb:bb:86]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:21:10.536  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:21:10.538 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:21:10.540 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:21:10.541 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:21:10.542  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:21:10.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:21:10.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:21:10.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:21:10.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:21:10.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:21:10.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:21:10.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:21:10.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:21:10.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:21:11.309  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:21:11.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:21:11.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:21:11.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:21:11.312  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:21:11.312  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:21:11.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:21:11.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:21:11.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:21:11.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:21:11.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:21:11.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:21:11.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:21:11.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:21:11.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:21:11.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:21:11.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:4b:2e:cd:60:91:ed:8d:09:d4:08:2f:9f:d3:46:d8:34:36:a5:fe]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:28:41.813  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:28:41.816 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:28:41.819 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:28:41.820 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:28:41.820  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:28:41.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:28:41.822  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:28:41.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:28:41.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:28:41.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:28:41.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:28:41.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:28:41.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:28:41.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:28:42.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:28:42.143  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:28:42.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:28:42.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:28:42.145  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:28:42.146  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:28:42.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:28:42.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:28:42.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:28:42.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:28:42.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:28:42.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:28:42.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:28:42.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:28:42.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:28:42.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:28:42.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: ab01c7b8a39cb67848e29365e5e7e82b0b8a270b2e990e0e8aef68ce00560e9ee37c7c6aed8d931a54bebaf9abf84e6990a304079c7579f4b32f533af0b3258ceb1c89c121992b00d37bce93efd0176662aaa02001d994f697e1f8c73240a71fded88233d52f3a8cbadbac5d0698703e19a575edb090dffeb23fab0c4998f2ec7a0b014630244c43491b21d7c194048c86af0fba39ba91700c43ccef425f66b661fe432231272878602f33d94f37fa5641d3a2e9567837322b31aeb546af50e074bd7532284e47733f96f1514fa8a2a7e1f8ae41059cb31a6952de40fb10665307d1f7937a9c8487d0d481dd990f73dfd0116f82b8f1a5595bcf443c48f49b41908704116d496dbb56472266f2474128e7730fc8cd71d29db0a82deb9413a35593c61f7e013712ed1f6575e8fb89aaefce753c98e96cd10ca066c2b82df9eafc137ba9a130046b1e18c0102ce0670e5a2941cb4bc118885aff296625a5a26294a8e7bdee7e9f6bd027bfbd05924a444eaeb979811298c905f530465775d7198d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:38:2f:1a:cf:37:20:9d:00:0b:14:ee:f0:c4:6d:37:f3:47:23:41]
            modulus: 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
    public exponent: 10001

] 
2022-07-16 07:33:08.778  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:33:08.780 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:33:08.783 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:33:08.783 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:33:08.784  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:33:08.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:33:08.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:33:08.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:33:08.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:33:08.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:33:08.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:33:08.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:33:08.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:33:08.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:33:09.181  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:33:09.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:33:09.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:33:09.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:33:09.184  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:33:09.185  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:33:09.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:33:09.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:33:09.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:33:09.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:33:09.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:33:09.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:33:09.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:33:09.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:33:09.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:33:09.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:33:09.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: ab01c7b8a39cb67848e29365e5e7e82b0b8a270b2e990e0e8aef68ce00560e9ee37c7c6aed8d931a54bebaf9abf84e6990a304079c7579f4b32f533af0b3258ceb1c89c121992b00d37bce93efd0176662aaa02001d994f697e1f8c73240a71fded88233d52f3a8cbadbac5d0698703e19a575edb090dffeb23fab0c4998f2ec7a0b014630244c43491b21d7c194048c86af0fba39ba91700c43ccef425f66b661fe432231272878602f33d94f37fa5641d3a2e9567837322b31aeb546af50e074bd7532284e47733f96f1514fa8a2a7e1f8ae41059cb31a6952de40fb10665307d1f7937a9c8487d0d481dd990f73dfd0116f82b8f1a5595bcf443c48f49b41908704116d496dbb56472266f2474128e7730fc8cd71d29db0a82deb9413a35593c61f7e013712ed1f6575e8fb89aaefce753c98e96cd10ca066c2b82df9eafc137ba9a130046b1e18c0102ce0670e5a2941cb4bc118885aff296625a5a26294a8e7bdee7e9f6bd027bfbd05924a444eaeb979811298c905f530465775d7198d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:c4:05:3c:c5:b2:0c:e3:e3:5b:a8:6d:81:a9:d5:03:f3:2e:52:6e]
            modulus: b6d9179fa4267cc99f868f93e954ad09235933d4f91135f6942dfa32575da44b69cd1c770f0ebf18a6a4b12225aa882660f2e906ea0590cbf2a123199442ccae28d0d77d40b3833b7c4ea35efb066f33b6ff58869ee141ba412dceb9bf79a1c82b36b283b714a3dfab3aa990a6e179ee70c1381dcc310a30302d4105b7c4ba25b98d07ece96a0f411ab06bd7a937fd88329511cda96d8812e9876115555513edc16dc13d3c5c16d4d02ff899873dbeba4b593fefcdf88868bbc79a29577c29dbf30258945df004aca0ca90ebd86ecb0f130e2ac6aa0cadd12d52ddac1993fc48f6d546799cd0ceffedbe6f1ea4a06bb5ffefca34397e5786ed6afdce3a38f73f
    public exponent: 10001

] 
2022-07-16 07:37:57.272  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-16 07:37:57.274 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-16 07:37:57.276 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:37:57.277 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-16 07:37:57.277  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-16 07:37:57.278  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-16 07:37:57.278  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-16 07:37:57.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-16 07:37:57.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-16 07:37:57.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-16 07:37:57.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-16 07:37:57.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:37:57.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-16 07:37:57.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:37:58.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-16 07:37:58.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-16 07:37:58.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-16 07:37:58.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-16 07:37:58.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-16 07:37:58.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-16 07:37:58.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:37:58.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:37:58.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:37:58.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:37:58.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:37:58.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:37:58.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-16 07:37:58.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-16 07:37:58.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-16 07:37:58.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-16 07:37:58.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22705056286989294454033493128471736582455450060
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 16 05:28:21 UTC 2022
           Final Date: Thu Jul 15 05:28:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ec:ea:44:5d:3f:66:73:33:9f:31:4a:f7:6c:51:de:39:79:b3:f9:d1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 32c8e702fa2ced936d9e3d0883870e4fe7a0f6ab
                       1504e01241c0d2f91286fd5947ea25c347adb374
                       2613f2593d557f255d2f3fba5f10aa072fc63ba8
                       1d7884e99e9116a48a619972068efe1c31c14907
                       5a46b03491af20039a76717f65a01bdc874d651f
                       f1a6dc95468552731bc47c29089ec3c927f488d3
                       4ff91f3c0492f58ec729afca878b01d9135d2de2
                       e88a0f25d24895f74f1767b30ccae446bc09075e
                       fef83fb92c2626c34a7314af3703e3cdea4a868f
                       a8ffe29d480995ca92e30d76d7a0283749c8a4bc
                       7636c3cbedb1c2b7aefa6c9d884a5aff3f982ac8
                       f845d8ca42d9acf10373416b2a2f5064b5a03a85
                       257cf2169ed5e0ab51fcbfba20694faeeea34149
                       192ad4181fdab087714a2af797b80040635854eb
                       735b604cceb5df06228a39bc57b09bbfd6221299
                       8888bcf1edb24f6ef711c49598df014d7ab9ce93
                       18f5034171271f4011abb3614baffcd74251a59b
                       ef14519c482b26dae34a4aade2b81a2e003ec16a
                       b6128ba8dbb774be29c74945d1719e2c56ad9398
                       042528dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:45:a2:63:ac:74:68:c4:80:3a:91:c9:b2:5e:18:29:ca:c6:60:1d]
            modulus: d7e7549db332da416ab757e39c1d6b1a1e37d3eb9b212fd257924f055578e6c7bb1188b0d77a3bfd488cd175070a94f1df01a65f9ca42da1b07dbd1605c9924213d61a17b2b5d58427e95b42f819d818d105f40dae94e7536295e5cf0702e888620305d76d3c11a3da6caf532fc82c6acc599fbbf2e94da36fe856e0fd31d933a7d653eca62009571fb576ff27749ca7b92172d662b78abe2e16565dcd4ce75f713fa67d29ab901d26a1dd3e80ebc02da697d1fbf15b9c970196d8db8a8168f1f537fb73ab288229535632026f4249421a6b789a0adbc6f910ab548ca879dadcf9842678731f51c7dbdd9631e74cbf2dbf57d8f16c9c99ec972572c2fa2a6459
    public exponent: 10001

]