Results

By type

          2022-03-30 00:48:15,434 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-30 00:48:19,327 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-30 00:48:22.042  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 30, 2022 12:48:30 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 30, 2022 12:48:30 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 30, 2022 12:48:30 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 30, 2022 12:48:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-30 00:48:32.839 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-30 00:48:34.142  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-30 00:48:34.936  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-30 00:48:37.739 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-30 00:48:37.742 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-30 00:48:37.743 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-30 00:48:37.746 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-30 00:48:37.941 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-30 00:48:37.944 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-30 00:48:38.350 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-30 00:48:42.043 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 30, 2022 12:48:44 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-30 00:48:45.840  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.5 seconds (JVM running for 40.074)
Mar 30, 2022 12:48:47 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-30 00:49:13.438  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 00:49:13.445 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 00:49:13.640 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-30 00:49:13.643 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 00:49:13.735  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-30 00:49:13.737  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 00:49:13.738  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 00:49:13.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 00:49:13.740 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 00:49:13.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 00:49:13.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 00:49:13.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 00:49:13.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 00:49:14.032 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 00:49:14.033 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 00:49:14.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 00:49:15.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 00:49:15.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 00:49:15.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 00:49:15.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 00:49:15.738  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 00:49:15.739  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 00:49:15.740 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 00:49:15.740 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 00:49:15.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 00:49:15.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 00:49:15.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 00:49:15.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 00:49:15.931 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 00:49:15.932 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 00:49:15.932 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 00:49:15.934 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 00:49:16.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: b96f6df6936519f101be8a3f9deaea0e412d93da837b6dffe7c971ded1aaa08b19c59df7efefc987db3867a7fc0edb024a3eb42af990696b335fe71b59c1554051b43934a72b5ce1b159410392011ee91864e4f6cf8a36c862467af0a5f1bdc677e8159e6fef8dec2bf6acf07b0a8a2ccbfc4f0680e84604b7b0ff26eb2e865adc645b1b74060899d000e1fab78e2d6c599703d4decdacd57f466ceaa63967b04949c264843c9ca69799b8bd8ba6fa658c37733b38fe7c2429a274bf743892de4d2dcd53b38f3b9a8cd49efc5fbc4eb175d85f2e692840fc926c3f1ada24f948ab79261fdd6342fd824463ef2bcc70a2c8ed8f8123c440800373f73f2b882e906fde06db7b5c4e7bf697fc6cc2d9eb7f889dcea541a7558b96cc2836e551ec0bb25b7804367361af7f489d6b6ce81814b5b3ed1929a2f3f6dadfaac1814fdc41352d63cc2493d8a90f125734302b2bf23f9d0c6ce042055a37709ba2ea5ff2eca84d24d44f2deb39e8d8533b969ea9bb92e58f5044ace890ef49cd73f39bf0d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:fd:fd:f0:ce:0d:88:e5:0b:39:4f:92:7a:a3:d3:7f:1c:b7:3e:36]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 02:47:40.147  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 02:47:40.149 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 02:47:40.150 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-30 02:47:40.152 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 02:47:40.153  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-30 02:47:40.154  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 02:47:40.154  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 02:47:40.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 02:47:40.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 02:47:40.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 02:47:40.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 02:47:40.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 02:47:40.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 02:47:40.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 02:47:40.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 02:47:40.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 02:47:40.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 02:47:40.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 02:47:40.370  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 02:47:40.370  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 02:47:40.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 02:47:40.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 02:47:40.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 02:47:40.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 02:47:40.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 02:47:40.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 02:47:40.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 02:47:40.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 02:47:40.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 02:47:40.376 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 02:47:40.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:ae:f6:d3:51:b3:a3:35:83:0e:cd:7f:34:f2:9d:2e:61:e3:1a:14]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 03:03:08.526  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:03:08.527 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:03:08.529 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:03:08.529 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:03:08.530  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:03:08.531  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:03:08.531  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:03:08.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:03:08.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:03:08.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:03:08.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:03:08.542 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:03:08.542 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:03:08.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:03:08.732  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:03:08.732  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:03:08.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:03:08.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:03:08.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:03:08.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:03:08.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:03:08.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:03:08.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:03:08.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:03:08.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:03:08.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:03:08.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:03:08.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:03:08.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:03:08.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:03:08.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: b96f6df6936519f101be8a3f9deaea0e412d93da837b6dffe7c971ded1aaa08b19c59df7efefc987db3867a7fc0edb024a3eb42af990696b335fe71b59c1554051b43934a72b5ce1b159410392011ee91864e4f6cf8a36c862467af0a5f1bdc677e8159e6fef8dec2bf6acf07b0a8a2ccbfc4f0680e84604b7b0ff26eb2e865adc645b1b74060899d000e1fab78e2d6c599703d4decdacd57f466ceaa63967b04949c264843c9ca69799b8bd8ba6fa658c37733b38fe7c2429a274bf743892de4d2dcd53b38f3b9a8cd49efc5fbc4eb175d85f2e692840fc926c3f1ada24f948ab79261fdd6342fd824463ef2bcc70a2c8ed8f8123c440800373f73f2b882e906fde06db7b5c4e7bf697fc6cc2d9eb7f889dcea541a7558b96cc2836e551ec0bb25b7804367361af7f489d6b6ce81814b5b3ed1929a2f3f6dadfaac1814fdc41352d63cc2493d8a90f125734302b2bf23f9d0c6ce042055a37709ba2ea5ff2eca84d24d44f2deb39e8d8533b969ea9bb92e58f5044ace890ef49cd73f39bf0d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:55:05:1c:7a:4c:62:af:f4:84:67:d4:c7:73:83:f8:bf:6d:11:3e]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 03:05:51.230  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:05:51.231 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:05:51.232 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:05:51.233 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:05:51.233  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:05:51.234  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:05:51.234  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:05:51.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:05:51.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:05:51.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:05:51.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:05:51.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:05:51.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:05:51.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:05:51.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:05:51.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:05:51.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:05:51.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:05:51.339  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:05:51.340  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:05:51.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:05:51.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:05:51.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:05:51.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:05:51.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:05:51.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:05:51.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:05:51.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:05:51.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:05:51.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:05:51.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: b96f6df6936519f101be8a3f9deaea0e412d93da837b6dffe7c971ded1aaa08b19c59df7efefc987db3867a7fc0edb024a3eb42af990696b335fe71b59c1554051b43934a72b5ce1b159410392011ee91864e4f6cf8a36c862467af0a5f1bdc677e8159e6fef8dec2bf6acf07b0a8a2ccbfc4f0680e84604b7b0ff26eb2e865adc645b1b74060899d000e1fab78e2d6c599703d4decdacd57f466ceaa63967b04949c264843c9ca69799b8bd8ba6fa658c37733b38fe7c2429a274bf743892de4d2dcd53b38f3b9a8cd49efc5fbc4eb175d85f2e692840fc926c3f1ada24f948ab79261fdd6342fd824463ef2bcc70a2c8ed8f8123c440800373f73f2b882e906fde06db7b5c4e7bf697fc6cc2d9eb7f889dcea541a7558b96cc2836e551ec0bb25b7804367361af7f489d6b6ce81814b5b3ed1929a2f3f6dadfaac1814fdc41352d63cc2493d8a90f125734302b2bf23f9d0c6ce042055a37709ba2ea5ff2eca84d24d44f2deb39e8d8533b969ea9bb92e58f5044ace890ef49cd73f39bf0d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:8a:c5:27:08:82:03:53:9a:b4:31:5c:c9:df:41:28:9f:58:e4:12]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 03:08:57.683  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:08:57.684 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:08:57.685 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:08:57.686 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:08:57.686  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:08:57.687  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:08:57.687  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:08:57.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:08:57.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:08:57.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:08:57.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:08:57.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:08:57.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:08:57.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:08:57.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:08:57.783  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:08:57.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:08:57.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:08:57.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:08:57.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:08:57.785 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:08:57.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:08:57.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:08:57.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:08:57.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:08:57.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:08:57.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:08:57.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:08:57.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:08:57.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:08:57.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:c6:85:49:6b:ef:f8:7e:15:82:19:5b:30:4e:5f:4e:37:33:98:64]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 03:11:07.936  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:11:07.937 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:11:07.939 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 03:11:07.939 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:11:07.939  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 03:11:07.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:11:07.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:11:07.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:11:07.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:11:07.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:11:07.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:11:07.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:11:07.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:11:07.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:11:08.045  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:11:08.046  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:11:08.046 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:11:08.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:11:08.048  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:11:08.049  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:11:08.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:11:08.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:11:08.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:11:08.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:11:08.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:11:08.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:11:08.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:11:08.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:11:08.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:11:08.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:11:08.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:7a:2f:3c:1e:56:98:34:49:e6:c8:42:34:b9:21:a3:9c:2c:de:3a]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 03:13:31.823  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:13:31.825 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:13:31.826 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-30 03:13:31.827 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:13:31.827  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-30 03:13:31.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:13:31.828  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:13:31.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:13:31.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:13:31.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:13:31.833 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:13:31.833 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:13:31.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:13:31.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:13:31.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:13:31.926  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:13:31.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:13:31.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:13:31.929  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:13:31.930  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:13:31.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:13:31.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:13:31.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:13:31.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:13:31.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:13:31.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:13:31.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:13:31.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:13:31.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:13:31.934 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:13:31.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:65:e4:97:a4:b2:7c:e9:cc:da:e5:fb:46:26:00:03:d6:07:c3:e7]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 03:16:43.040  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:16:43.042 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:16:43.043 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:16:43.044 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:16:43.045  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-30 03:16:43.046  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:16:43.046  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:16:43.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:16:43.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:16:43.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:16:43.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:16:43.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:16:43.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:16:43.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:16:43.209  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:16:43.210  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:16:43.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:16:43.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:16:43.211  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:16:43.212  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:16:43.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:16:43.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:16:43.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:16:43.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:16:43.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:16:43.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:16:43.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:16:43.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:16:43.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:16:43.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:16:43.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 582733876895060206662291373786560155773332772072
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 00:45:27 UTC 2022
           Final Date: Mon Mar 29 00:45:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:cd:ee:9a:03:87:4d:4c:74:71:c0:54:8d:8e:e4:7e:bd:ca:6a:43]
            modulus: b96f6df6936519f101be8a3f9deaea0e412d93da837b6dffe7c971ded1aaa08b19c59df7efefc987db3867a7fc0edb024a3eb42af990696b335fe71b59c1554051b43934a72b5ce1b159410392011ee91864e4f6cf8a36c862467af0a5f1bdc677e8159e6fef8dec2bf6acf07b0a8a2ccbfc4f0680e84604b7b0ff26eb2e865adc645b1b74060899d000e1fab78e2d6c599703d4decdacd57f466ceaa63967b04949c264843c9ca69799b8bd8ba6fa658c37733b38fe7c2429a274bf743892de4d2dcd53b38f3b9a8cd49efc5fbc4eb175d85f2e692840fc926c3f1ada24f948ab79261fdd6342fd824463ef2bcc70a2c8ed8f8123c440800373f73f2b882e906fde06db7b5c4e7bf697fc6cc2d9eb7f889dcea541a7558b96cc2836e551ec0bb25b7804367361af7f489d6b6ce81814b5b3ed1929a2f3f6dadfaac1814fdc41352d63cc2493d8a90f125734302b2bf23f9d0c6ce042055a37709ba2ea5ff2eca84d24d44f2deb39e8d8533b969ea9bb92e58f5044ace890ef49cd73f39bf0d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad9fddde756135cfa2563a1d70cc94c54d5c055a
                       b3b364625375a3b283350e83985b0e4ed0254def
                       0c2e239abd6f70887e8d15318427bd47ff2db6b8
                       6f8ab4e179cd5588531d7860729fc9a18288ac44
                       18073cce5ff974429263e8c74ae291e7a12b32f8
                       bbd977b44465b9eee069134ffc68299c870da430
                       96eb5aadbec37d4c77f67bd818afa69f1a45b378
                       77827c07ddb1a911d611d6fbcf3c10858395069c
                       4b2a3feae32bb3fe6180db16a43de828f7a11834
                       eda847ae7dd6a7bb3ee84ae5d932ee80f5f69c7a
                       f72657d83a9349cefa0daaecc145d516f9650ecd
                       ab310b7e6032505cd870375998f1c169bcf4100b
                       8ee8ffe16c68f3c5d3c43e15949d2d3ba2fd74a3
                       d16b568e1f04961b41ff18b6add7adef4398b144
                       3b5e0934001b8dd70bb012c8fdc4eee84d3a50ad
                       6ef0c1a67923f7c9b7ebda08f296b875f5cac5e4
                       ec6eaaae631f7620cdd81a71e6a644f3bb8a3a68
                       5216ae63973d5eb085ca533d0888511a80bdf250
                       8398e2074bc5da6d2cedc85cfac7b524f9f7151a
                       d84e8fa2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:10:b2:2e:55:22:98:9a:3e:32:a4:be:44:a5:d6:22:13:09:a4:c6]
            modulus: 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
    public exponent: 10001

]