Results

By type

          2022-05-06 13:31:18,066 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-06 13:31:23,466 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-06 13:31:26.960  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 06, 2022 1:31:37 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 06, 2022 1:31:37 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 06, 2022 1:31:37 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 06, 2022 1:31:37 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-06 13:31:39.974 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-06 13:31:41.268  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-06 13:31:42.257  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-06 13:31:45.862 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-06 13:31:45.866 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-06 13:31:45.868 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-06 13:31:45.952 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-06 13:31:46.159 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-06 13:31:46.164 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-06 13:31:46.755 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-06 13:31:51.959 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 06, 2022 1:31:55 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-06 13:31:56.464  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 42.595 seconds (JVM running for 51.419)
May 06, 2022 1:31:59 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-06 13:32:59.157  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 13:32:59.165 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 13:32:59.355 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-06 13:32:59.360 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 13:32:59.454  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-06 13:32:59.459  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 13:32:59.460  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 13:32:59.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 13:32:59.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 13:32:59.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 13:32:59.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 13:32:59.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 13:32:59.758 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 13:32:59.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 13:32:59.765 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 13:32:59.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 13:33:01.199  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 13:33:01.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 13:33:01.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 13:33:01.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 13:33:01.210  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 13:33:01.211  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 13:33:01.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 13:33:01.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 13:33:01.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 13:33:01.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 13:33:01.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 13:33:01.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 13:33:01.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 13:33:01.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 13:33:01.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 13:33:01.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 13:33:01.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:71:f3:0f:c0:57:b2:8c:61:04:ad:ea:9a:59:1f:47:8f:bd:cd:05]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:08:58.646  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:08:58.649 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:08:58.651 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:08:58.653 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:08:58.655  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:08:58.655  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:08:58.656  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:08:58.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:08:58.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:08:58.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:08:58.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:08:58.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:08:58.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:08:58.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:08:58.869  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:08:58.869  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:08:58.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:08:58.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:08:58.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:08:58.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:08:58.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:08:58.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:08:58.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:08:58.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:08:58.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:08:58.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:08:58.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:08:58.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:08:58.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:08:58.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:08:58.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:3e:f7:3d:e4:0e:f7:01:e1:b5:7a:71:d9:fc:5a:ea:2e:b5:b2:c9]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:12:55.111  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:12:55.113 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:12:55.116 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:12:55.116 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:12:55.117  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:12:55.118  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:12:55.118  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:12:55.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:12:55.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:12:55.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:12:55.125 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:12:55.125 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:12:55.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:12:55.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:12:55.259  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:12:55.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:12:55.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:12:55.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:12:55.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:12:55.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:12:55.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:12:55.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:12:55.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:12:55.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:12:55.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:12:55.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:12:55.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:12:55.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:12:55.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:12:55.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:12:55.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:0b:4a:e2:7f:c2:9c:46:69:ed:78:29:95:f0:b2:85:82:21:08:02]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:14:25.391  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:14:25.392 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:14:25.393 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-06 15:14:25.394 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:14:25.394  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-06 15:14:25.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:14:25.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:14:25.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:14:25.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:14:25.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:14:25.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:14:25.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:14:25.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:14:25.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:14:25.499  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:14:25.500  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:14:25.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:14:25.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:14:25.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:14:25.503  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:14:25.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:14:25.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:14:25.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:14:25.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:14:25.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:14:25.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:14:25.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:14:25.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:14:25.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:14:25.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:14:25.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:5a:d0:00:37:70:41:7b:b4:26:5c:75:6e:48:b6:53:19:76:55:19]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:16:36.217  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:16:36.219 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:16:36.221 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:16:36.222 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:16:36.223  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:16:36.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:16:36.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:16:36.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:16:36.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:16:36.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:16:36.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:16:36.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:16:36.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:16:36.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:16:36.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:16:36.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:16:36.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:16:36.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:16:36.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:16:36.352  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:16:36.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:16:36.353 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:16:36.353 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:16:36.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:16:36.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:16:36.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:16:36.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:16:36.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:16:36.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:16:36.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:16:36.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:33:dd:74:82:7c:b5:c1:5e:78:2a:17:01:35:d6:ea:f8:5d:d1:0c]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:20:17.970  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:20:17.971 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:20:17.973 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:20:17.973 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:20:17.974  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:20:17.974  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:20:17.974  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:20:17.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:20:17.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:20:17.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:20:17.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:20:17.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:20:17.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:20:17.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:20:18.136  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:20:18.137  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:20:18.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:20:18.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:20:18.138  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:20:18.139  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:20:18.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:20:18.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:20:18.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:20:18.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:20:18.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:20:18.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:20:18.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:20:18.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:20:18.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:20:18.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:20:18.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:1c:07:e4:48:72:60:4c:3d:aa:0d:f0:c1:a3:30:34:ff:c9:05:67]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:24:24.465  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:24:24.466 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:24:24.468 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:24:24.468 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:24:24.469  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:24:24.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:24:24.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:24:24.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:24:24.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:24:24.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:24:24.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:24:24.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:24:24.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:24:24.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:24:24.648  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:24:24.649  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:24:24.649 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:24:24.649 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:24:24.650  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:24:24.650  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:24:24.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:24:24.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:24:24.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:24:24.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:24:24.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:24:24.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:24:24.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:24:24.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:24:24.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:24:24.654 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:24:24.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: ad48f66c51ae5b506e85930af98b691691986802b95a425ef643d57a0bfbbf05f70c42070bfd8384be8af694984f9470dfa51316e2af385cd1c9aa3ecd51c9eeacdc16f72ce3b1aa72c98861fe53a2bdd17db99510009d22ffd01af7fab906a93b8983ea53d1201f73f3e14dffa5a3ed8d3f9be13b5eeaf182413a908408d379c170f0cef22d87317a7e82a089ed2af107821a53fd5822f6c9f552b18855c8f508f609ad05582168fa709cb0b84174d8ed522576d83e7993e3f9e7e742c504331527f49479c514b9d53f977c5e06dd8e6a1d7666dfb4e4f6002bea2ff3270bfae49fc4b4320b987f0ea865c15d0a3316c0f5a5d8f88533b69ae606df29f883b8ba80fddee2e6d1431f260edc381f52257f0d812696cec39222a2a00c502d29fe5e96b7173cb1dbec759edee3ef8321bd450e2c07d2c2185e9e79de9c71cd877499f1e6ef7a7083c8aaa0cab50633e48cf813837e0569337d0d88513e7777a76a1d29edbc1fcaa91a561a2eb7392ff8f7fee399a3420d57cb802652d7b6712713
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:1c:c0:66:bf:41:dd:74:6a:55:f4:1b:f0:8c:25:92:8b:c2:3e:07]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:26:12.981  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:26:12.983 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:26:12.984 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-06 15:26:12.985 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:26:12.985  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-06 15:26:12.986  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:26:12.986  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:26:12.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:26:12.987 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:26:12.987 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:26:12.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:26:12.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:26:12.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:26:12.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:26:13.154  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:26:13.155  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:26:13.155 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:26:13.156 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:26:13.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:26:13.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:26:13.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:26:13.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:26:13.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:26:13.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:26:13.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:26:13.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:26:13.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:26:13.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:26:13.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:26:13.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:26:13.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:ef:91:b0:1c:96:0f:b1:13:43:28:2e:47:aa:3f:1c:1a:70:86:55]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:28:24.410  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:28:24.411 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:28:24.413 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-06 15:28:24.414 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:28:24.414  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-06 15:28:24.415  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:28:24.415  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:28:24.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:28:24.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:28:24.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:28:24.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:28:24.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:28:24.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:28:24.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:28:24.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:28:24.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:28:24.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:28:24.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:28:24.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:28:24.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:28:24.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:28:24.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:28:24.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:28:24.556 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:28:24.556 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:28:24.556 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:28:24.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:28:24.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:28:24.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:28:24.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:28:24.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:5c:4b:77:d2:a8:5c:d9:2d:ac:bf:e1:c9:34:4b:f3:db:cd:d2:43]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:32:29.432  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:32:29.433 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:32:29.434 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:32:29.435 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:32:29.435  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:32:29.435  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:32:29.435  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:32:29.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:32:29.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:32:29.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:32:29.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:32:29.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:32:29.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:32:29.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:32:29.519  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:32:29.519  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:32:29.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:32:29.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:32:29.522  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:32:29.522  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:32:29.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:32:29.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:32:29.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:32:29.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:32:29.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:32:29.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:32:29.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:32:29.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:32:29.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:32:29.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:32:29.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:f1:42:31:44:c4:2a:f4:02:95:3e:59:af:0d:2c:e0:83:d6:ea:c4]
            modulus: dbcfd61f0e6fc2114a9afc43e9ee7999ebd5363df7969e64588b6c26ab40848ad4acc8e1dfbac01af0be02f629cfb1636e79d386c25db023d5592d55eb7e3faeb15b5e9cddff830659d05d1c5a727810e72bb76eafa66e059acf275b8dd5f0cd75373ebd82e06a48f0ea3d4fb10d3c4556d6e5fd3a8f5d33802e1a307983836711528cbbbb8e3f72572b03e329b6f4eb0483e06f5190c35a63d844b44a4ad642c4e5697540886ba4cce59e3ae25ea0f5054b8e9959b3185708f87fbad90e8c8e620ac0baf2194b256a4dc8f089e3b8166aecab0be1108f3664ed14a36b04f2b5182de1c123c7034d359328d3ae6edd006f87d1694f70d67db9620628a5f41cad
    public exponent: 10001

] 
2022-05-06 15:34:26.875  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:34:26.876 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:34:26.877 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-06 15:34:26.878 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:34:26.878  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-06 15:34:26.878  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:34:26.878  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:34:26.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:34:26.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:34:26.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:34:26.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:34:26.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:34:26.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:34:26.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:34:26.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:34:26.968  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:34:26.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:34:26.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:34:26.971  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:34:26.972  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:34:26.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:34:26.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:34:26.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:34:26.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:34:26.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:34:26.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:34:26.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:34:26.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:34:26.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:34:26.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:34:26.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:6b:2c:78:f7:9f:b0:e4:24:68:87:66:45:11:7a:50:a4:c4:66:29]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:35:48.280  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:35:48.281 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:35:48.284 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-06 15:35:48.284 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:35:48.284  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-06 15:35:48.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:35:48.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:35:48.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:35:48.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:35:48.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:35:48.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:35:48.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:35:48.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:35:48.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:35:48.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:35:48.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:35:48.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:35:48.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:35:48.443  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:35:48.443  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:35:48.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:35:48.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:35:48.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:35:48.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:35:48.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:35:48.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:35:48.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:35:48.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:35:48.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:35:48.448 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:35:48.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:98:e2:8c:20:73:fe:8c:be:a2:26:da:99:bf:c4:48:96:d7:b7:4f]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:40:07.604  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:40:07.605 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:40:07.607 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:40:07.608 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:40:07.608  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:40:07.609  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:40:07.609  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:40:07.609 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:40:07.609 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:40:07.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:40:07.615 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:40:07.615 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:40:07.616 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:40:07.616 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:40:07.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:40:07.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:40:07.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:40:07.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:40:07.699  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:40:07.699  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:40:07.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:40:07.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:40:07.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:40:07.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:40:07.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:40:07.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:40:07.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:40:07.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:40:07.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:40:07.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:40:07.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:3b:d5:cf:34:e2:fd:3e:df:38:6f:4d:1a:a7:81:7a:28:4f:39:7d]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:40:08.116  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:40:08.116 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:40:08.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:40:08.118 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:40:08.118  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:40:08.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:40:08.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:40:08.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:40:08.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:40:08.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:40:08.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:40:08.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:40:08.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:40:08.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:40:08.214  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:40:08.215  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:40:08.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:40:08.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:40:08.250  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:40:08.251  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:40:08.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:40:08.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:40:08.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:40:08.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:40:08.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:40:08.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:40:08.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:40:08.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:40:08.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:40:08.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:40:08.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:96:a9:5c:82:af:0c:a7:d3:f3:b1:d6:45:57:47:94:63:dd:f6:7f]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:45:32.089  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:45:32.091 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:45:32.093 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:45:32.094 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:45:32.094  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:45:32.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:45:32.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:45:32.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:45:32.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:45:32.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:45:32.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:45:32.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:45:32.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:45:32.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:45:32.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:45:32.182  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:45:32.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:45:32.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:45:32.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:45:32.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:45:32.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:45:32.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:45:32.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:45:32.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:45:32.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:45:32.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:45:32.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:45:32.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:45:32.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:45:32.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:45:32.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:7d:b5:63:ad:d8:dc:ff:09:f5:5b:e2:44:4d:fb:3d:ab:f0:15:04]
            modulus: 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
    public exponent: 10001

] 
2022-05-06 15:46:36.182  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-06 15:46:36.183 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-06 15:46:36.184 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:46:36.185 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-06 15:46:36.185  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-06 15:46:36.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-06 15:46:36.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-06 15:46:36.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-06 15:46:36.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-06 15:46:36.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-06 15:46:36.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-06 15:46:36.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:46:36.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-06 15:46:36.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:46:36.333  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-06 15:46:36.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-06 15:46:36.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-06 15:46:36.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-06 15:46:36.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-06 15:46:36.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-06 15:46:36.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:46:36.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:46:36.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:46:36.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:46:36.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:46:36.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:46:36.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-06 15:46:36.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-06 15:46:36.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-06 15:46:36.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-06 15:46:36.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 42237790372146569832748236227500352723343500047
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 06 13:27:51 UTC 2022
           Final Date: Wed May 05 13:27:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:44:f7:c5:27:4a:cf:c0:4d:43:cc:4e:cc:c1:e1:2d:a8:71:78:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8078554caa8ed96e5c96a7d0ed5700bceac15965
                       ab7f1981f3a40749f476475f2ba6002f8629146b
                       855a2152cade314ba02143334b1f5fc9211ed395
                       df9545c607b4e6765fb11dfc6eefa087d7ee5ae7
                       8e9d0e0d375985bc9230ad155d5df9994da121ab
                       603678777f6099202595018beec0e36fe228fa06
                       7a175bccdeb8c3044d09478c2139dc868ce2a767
                       96eb22027fd1614568338f07d7820fd88affbf57
                       77136dce605c446c38195b91a8ff797bcadff478
                       204605ddbde7b71c1bd8b43f9574502273ccf7ef
                       2b3a600267e8b91de77081d151bd4ee6eb2bc901
                       2fc982060efa321cd4c0249abdcd696f2e778ff4
                       13ebb9d32fcd9131c60435951dcca7af9716a5dc
                       e68c35be740bb0ae9b1141764507127872cf5788
                       f08b8587b2b2bc55abba8ccfaa3e1f882f2b81c6
                       51bb06e600d4871476d892e583c0d7b2c993f9e1
                       ee2c21dfcf50457d74f0437d6b49b54e5049da43
                       7674c6dfd4e196a87a88b74a54612d3612aac6a8
                       ae4c253ceefb6e787d3e69530eb1644982dc08a2
                       94fe114e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:c9:1f:bf:f7:6d:b0:6c:cb:71:35:fe:e9:a3:13:c4:5f:92:f8:df]
            modulus: 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
    public exponent: 10001

]