Results

By type

          2022-06-07 21:57:17,007 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-07 21:57:18,459 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-07 21:57:19.593  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 07, 2022 9:57:22 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 07, 2022 9:57:22 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 07, 2022 9:57:22 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 07, 2022 9:57:22 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-07 21:57:23.765 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-07 21:57:24.235  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-07 21:57:24.498  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-07 21:57:25.681 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-07 21:57:25.686 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-07 21:57:25.688 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-07 21:57:25.693 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-07 21:57:25.763 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-07 21:57:25.774 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-07 21:57:25.983 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-07 21:57:26.840 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 07, 2022 9:57:27 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-07 21:57:28.068  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.371 seconds (JVM running for 15.026)
Jun 07, 2022 9:57:45 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-07 21:58:02.469  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 21:58:02.482 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 21:58:02.563 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 21:58:02.570 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 21:58:02.610  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 21:58:02.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 21:58:02.619  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 21:58:02.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 21:58:02.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 21:58:02.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 21:58:02.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 21:58:02.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 21:58:02.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 21:58:02.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 21:58:02.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 21:58:02.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 21:58:04.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 21:58:04.030  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 21:58:04.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 21:58:04.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 21:58:04.054  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 21:58:04.055  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 21:58:04.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 21:58:04.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 21:58:04.057 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 21:58:04.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 21:58:04.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 21:58:04.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 21:58:04.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 21:58:04.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 21:58:04.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 21:58:04.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 21:58:04.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:04:06:6a:ea:98:db:4b:c2:d7:01:58:58:0a:1a:e5:22:72:19:8e]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:18:51.124  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:18:51.130 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:18:51.135 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:18:51.137 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:18:51.138  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:18:51.140  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:18:51.140  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:18:51.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:18:51.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:18:51.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:18:51.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:18:51.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:18:51.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:18:51.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:18:51.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:18:51.477  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:18:51.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:18:51.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:18:51.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:18:51.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:18:51.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:18:51.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:18:51.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:18:51.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:18:51.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:18:51.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:18:51.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:18:51.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:18:51.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:18:51.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:18:51.502 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 960503002d2eb616f56ed56c681c007219c1e86f813622eeabc2084db69c6173e6b5024ef74aecdb1ac923e9b29b84abf8b00afe8b5921d70f08fe61475f24af9fefad540b50055c6b9eb7ae91a5bd2efdddd9b4cf5f861dc3260e040f851265b487172302c80e0924e0e44db4870715a9483445fa26495afaacc9835e5cbc2d55e9de21a82ba54820c43c521bcd74f4c5e6fd9a07a83afa784f25515f1fa8834f0736d5d80b8eb224810823655d2923e4287e640106558600b3933b1c6722c3310f92f820884110216c03ad4c39f1c6440da466e89bb90db9710417795861dc7274173f92c5ac8c5d88c941010882ac9cf6bb7c192e9f1d24e502443687c7670b372a3256b2ebc13f42f81b25e64add7b9186a32e62c39b2dc1a2b73f848cc008998c72ffc57cc09019a14c75771df12772108ac79ac09db3c9e3ae1f421ab2482134e6b19532a13a6fea103552944f3e152b22b245ce7857b3909fd3aca466c19bed7c72a42457284a80733ea38f9965b15cb23e40c919f1fb890c9b8f0d2b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:ad:bd:bf:93:93:2e:5b:d2:0c:64:7a:79:ca:a6:35:50:1c:33:99]
            modulus: aff4b1f4871c1cf58ed5ae35c5371ed88a1e029a49bbaf3b9d60e0b3660d88c826d59a854a7af606f021a412a17ff3fdebb3c774aa82dd40dd3f38314d0f969673a19e3144058734549f7f35bea056646c2370bb71371ab1ae3408c9f692467d9133ce505a433682d52d6a6978e7a6845e37110b2a16edb269ab251eed74e1ab91ffea553ea6857455a878301d4c4a2c6332297fdfe1bb62c565b17de1262501b256ae7e9811e617a3b636a3b5723a4622409502d0c1537bd68efb0067881c47bab2a41912748f6ce728bcdcdb5d7940b0f5a5c0a400eefcbf817841f2fd7a9aa163faa01a9c845a1030ae8af73b2e5854a25dce8032f1eedb69c40c991a5b01
    public exponent: 10001

] 
2022-06-07 23:20:39.662  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:20:39.664 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:20:39.670 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 23:20:39.671 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:20:39.672  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 23:20:39.673  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:20:39.674  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:20:39.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:20:39.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:20:39.676 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:20:39.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:20:39.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:20:39.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:20:39.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:20:40.057  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:20:40.058  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:20:40.059 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:20:40.059 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:20:40.063  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:20:40.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:20:40.065 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:20:40.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:20:40.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:20:40.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:20:40.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:20:40.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:20:40.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:20:40.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:20:40.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:20:40.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:20:40.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:ed:5d:b2:28:c2:df:ba:36:3f:67:2f:75:6f:ee:c3:29:71:d6:cc]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:22:29.707  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:22:29.709 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:22:29.711 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 23:22:29.714 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:22:29.715  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 23:22:29.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:22:29.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:22:29.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:22:29.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:22:29.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:22:29.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:22:29.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:22:29.725 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:22:29.725 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:22:29.957  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:22:29.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:22:29.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:22:29.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:22:29.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:22:29.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:22:29.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:22:29.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:22:29.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:22:29.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:22:29.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:22:29.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:22:29.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:22:29.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:22:29.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:22:29.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:22:29.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:37:0b:82:07:99:e3:05:8a:fe:d2:04:d0:9f:12:50:0a:6d:77:ac]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:24:47.533  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:24:47.536 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:24:47.539 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:24:47.540 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:24:47.542  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:24:47.542  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:24:47.544  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:24:47.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:24:47.545 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:24:47.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:24:47.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:24:47.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:24:47.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:24:47.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:24:47.784  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:24:47.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:24:47.785 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:24:47.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:24:47.788  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:24:47.789  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:24:47.790 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:24:47.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:24:47.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:24:47.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:24:47.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:24:47.794 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:24:47.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:24:47.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:24:47.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:24:47.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:24:47.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:b6:94:17:de:45:02:df:f6:50:cd:13:28:65:0c:17:b9:9b:e0:1b]
            modulus: a6331caaa8d0c35245bf9eb6d5b62458e2c27d9399d0d8f97f29ca9aaa29ed754b5afa64a940813f4902ce3d68425661a45b363cbd175c6357bff1748e2c9b3ac5dca8138c8a8edf397f842fb1a84e74ac7bcb2c41efcae16f32b2dd6077a744ae0da781b752120651c587abf4038aace0874aebdf5b033788ddd30c9e90bafef223e83659db1a7a8fb660187d2fa8ef47a34ed9977688532c246f99dc2b00fef8b6c8baeceb598a574451246711423c065457346e2b70f784dd842a8d6b0715ddd3801fa6d0312cf943da9ac7258173aa14dd509012f1c66d3fc1ce838060de437064d5b4020402a2cdd94e7d6489d1a955087c1b5b3b4c5f62144b01bcb67b
    public exponent: 10001

] 
2022-06-07 23:28:29.677  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:28:29.679 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:28:29.682 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:28:29.683 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:28:29.684  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:28:29.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:28:29.686  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:28:29.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:28:29.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:28:29.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:28:29.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:28:29.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:28:29.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:28:29.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:28:29.890  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:28:29.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:28:29.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:28:29.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:28:29.894  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:28:29.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:28:29.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:28:29.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:28:29.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:28:29.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:28:29.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:28:29.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:28:29.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:28:29.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:28:29.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:28:29.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:28:29.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:61:c5:24:a2:2b:13:8c:70:c2:ce:01:15:a2:f6:44:8f:e4:02:02]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:32:45.081  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:32:45.087 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:32:45.090 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:32:45.091 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:32:45.091  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:32:45.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:32:45.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:32:45.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:32:45.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:32:45.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:32:45.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:32:45.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:32:45.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:32:45.105 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:32:45.400  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:32:45.401  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:32:45.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:32:45.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:32:45.404  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:32:45.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:32:45.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:32:45.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:32:45.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:32:45.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:32:45.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:32:45.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:32:45.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:32:45.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:32:45.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:32:45.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:32:45.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:a5:7e:5f:aa:9f:a6:19:f7:41:36:85:13:30:ab:16:dc:1f:03:c7]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:34:29.556  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:34:29.558 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:34:29.560 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 23:34:29.560 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:34:29.561  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 23:34:29.562  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:34:29.563  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:34:29.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:34:29.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:34:29.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:34:29.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:34:29.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:34:29.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:34:29.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:34:29.799  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:34:29.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:34:29.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:34:29.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:34:29.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:34:29.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:34:29.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:34:29.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:34:29.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:34:29.807 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:34:29.807 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:34:29.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:34:29.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:34:29.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:34:29.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:34:29.811 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:34:29.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:c9:1d:8a:17:06:28:6d:b6:76:11:3a:75:51:a9:06:90:bd:8d:f8]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:36:41.469  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:36:41.472 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:36:41.476 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:36:41.480 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:36:41.481  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:36:41.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:36:41.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:36:41.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:36:41.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:36:41.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:36:41.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:36:41.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:36:41.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:36:41.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:36:41.844  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:36:41.845  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:36:41.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:36:41.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:36:41.848  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:36:41.848  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:36:41.849 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:36:41.849 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:36:41.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:36:41.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:36:41.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:36:41.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:36:41.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:36:41.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:36:41.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:36:41.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:36:41.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:34:b6:1e:5a:a4:c9:65:4b:81:79:6f:bd:9f:69:bc:1e:f8:c3:f3]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:40:45.324  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:40:45.328 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:40:45.331 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 23:40:45.333 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:40:45.334  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 23:40:45.334  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:40:45.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:40:45.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:40:45.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:40:45.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:40:45.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:40:45.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:40:45.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:40:45.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:40:45.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:40:45.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:40:45.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:40:45.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:40:45.645  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:40:45.645  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:40:45.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:40:45.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:40:45.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:40:45.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:40:45.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:40:45.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:40:45.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:40:45.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:40:45.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:40:45.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:40:45.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:aa:f1:0b:60:f6:51:5f:3d:6a:69:e6:43:8f:e0:1a:2e:56:3e:09]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:41:02.992  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:41:03.011 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:41:03.013 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 23:41:03.014 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:41:03.015  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 23:41:03.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:41:03.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:41:03.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:41:03.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:41:03.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:41:03.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:41:03.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:41:03.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:41:03.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:41:03.210  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:41:03.211  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:41:03.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:41:03.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:41:03.214  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:41:03.214  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:41:03.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:41:03.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:41:03.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:41:03.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:41:03.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:41:03.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:41:03.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:41:03.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:41:03.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:41:03.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:41:03.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:35:86:69:3c:8f:31:80:9d:fa:43:b5:bc:57:14:e7:c6:ed:d9:df]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:41:43.265  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:41:43.267 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:41:43.269 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:41:43.269 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:41:43.270  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:41:43.271  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:41:43.272  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:41:43.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:41:43.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:41:43.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:41:43.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:41:43.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:41:43.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:41:43.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:41:43.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:41:43.500  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:41:43.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:41:43.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:41:43.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:41:43.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:41:43.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:41:43.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:41:43.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:41:43.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:41:43.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:41:43.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:41:43.508 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:41:43.508 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:41:43.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:41:43.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:41:43.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:de:16:8c:5e:75:1e:32:7a:ed:2d:95:39:07:ee:81:02:bd:09:1a]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:45:59.071  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:45:59.073 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:45:59.075 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:45:59.075 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:45:59.076  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:45:59.077  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:45:59.077  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:45:59.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:45:59.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:45:59.079 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:45:59.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:45:59.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:45:59.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:45:59.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:45:59.277  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:45:59.278  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:45:59.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:45:59.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:45:59.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:45:59.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:45:59.282 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:45:59.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:45:59.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:45:59.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:45:59.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:45:59.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:45:59.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:45:59.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:45:59.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:45:59.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:45:59.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:7a:02:b7:f1:df:7d:6a:23:21:59:e3:8d:7d:4f:76:f0:38:63:c6]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:50:58.669  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:50:58.672 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:50:58.675 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:50:58.676 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:50:58.681  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:50:58.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:50:58.686  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:50:58.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:50:58.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:50:58.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:50:58.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:50:58.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:50:58.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:50:58.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:50:58.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:50:58.901  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:50:58.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:50:58.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:50:58.903  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:50:58.903  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:50:58.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:50:58.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:50:58.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:50:58.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:50:58.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:50:58.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:50:58.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:50:58.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:50:58.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:50:58.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:50:58.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:f6:29:11:c9:73:96:06:43:08:f0:9d:b4:c6:0b:40:32:f4:c3:e4]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 23:57:15.316  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 23:57:15.320 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 23:57:15.324 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:57:15.326 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 23:57:15.326  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 23:57:15.327  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 23:57:15.327  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 23:57:15.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 23:57:15.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 23:57:15.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 23:57:15.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 23:57:15.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:57:15.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 23:57:15.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:57:15.567  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 23:57:15.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 23:57:15.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 23:57:15.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 23:57:15.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 23:57:15.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 23:57:15.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:57:15.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:57:15.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:57:15.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:57:15.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:57:15.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:57:15.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 23:57:15.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 23:57:15.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 23:57:15.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 23:57:15.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:32:86:a0:64:e0:96:8f:91:6c:8a:a5:e0:33:b7:09:14:ba:8a:f6]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 00:02:17.347  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 00:02:17.351 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 00:02:17.353 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 00:02:17.354 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 00:02:17.355  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 00:02:17.355  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 00:02:17.356  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 00:02:17.356 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 00:02:17.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 00:02:17.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 00:02:17.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 00:02:17.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 00:02:17.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 00:02:17.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 00:02:17.557  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 00:02:17.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 00:02:17.559 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 00:02:17.559 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 00:02:17.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 00:02:17.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 00:02:17.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 00:02:17.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 00:02:17.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 00:02:17.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 00:02:17.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 00:02:17.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 00:02:17.565 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 00:02:17.566 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 00:02:17.566 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 00:02:17.567 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 00:02:17.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304326462738781953610759496905236221860504279764
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 21:54:10 UTC 2022
           Final Date: Sun Jun 06 21:54:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:c1:f0:ee:d4:e8:85:90:1d:e9:bc:24:74:ff:50:50:85:9b:d8:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b48de53bde99e1c007fa042b2c1774d1d2151c6
                       637e67ddddcee251567602640e229451076b4190
                       7d94cde77fb589ca320b02722fdcde1029487a4b
                       8b3323c3b295d618ab0906a3f0785bdfdda040ee
                       cd79464a3b78b709a44fbac4ec0088f3505204ec
                       15b9a488eb886852c611c4caffd5e08340ffbe2d
                       29a6077162eefdf133f65fbc4516e2d5952c2d18
                       ec6611b42b51790cb700146ac575fce2e7c39684
                       e92670e7ac5e87dc9f54d685686fa7193585e25c
                       b35f5649ff730d0b6d251eb74612dfd01fbd9dd1
                       dd192d8283857b72d725710607574b1090761a49
                       320146c46022a0d788915d350a6e9df43761d710
                       6f81ec161159f4df196e0c3e869f0b563b777018
                       15df4fea59fc1c1f5e9eb25a0b8dae53fe2b02ba
                       6f7868e6a3369f836512897d6e5b830038929894
                       f86f6ad0afc0084deb288306e9bbde20e9e0149e
                       479bef982851fb765ff2d3c481e8870a30a29da5
                       bf06b684f68b5d043471bc278a38524f377af316
                       f45e1fbc1146fee3b98a302a65cc6e36a8efff72
                       e3d992a5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:0d:33:b9:ee:ed:51:28:33:a5:4b:28:ab:f7:f0:1e:50:61:0b:6f]
            modulus: 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
    public exponent: 10001

]