Results

By type

          2022-05-25 03:09:34,335 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-25 03:09:34,994 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-25 03:09:35.600  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 25, 2022 3:09:36 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 25, 2022 3:09:36 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 25, 2022 3:09:36 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 25, 2022 3:09:36 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-25 03:09:37.328 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-25 03:09:37.521  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-25 03:09:37.623  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-25 03:09:38.163 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-25 03:09:38.167 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-25 03:09:38.168 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-25 03:09:38.172 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-25 03:09:38.203 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-05-25 03:09:38.207 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-25 03:09:38.304 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-25 03:09:38.820 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 25, 2022 3:09:39 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-25 03:09:39.457  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 5.583 seconds (JVM running for 6.632)
May 25, 2022 3:10:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-25 03:10:35.510  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 03:10:35.521 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 03:10:35.552 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 03:10:35.556 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 03:10:35.569  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 03:10:35.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 03:10:35.572  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 03:10:35.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 03:10:35.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 03:10:35.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 03:10:35.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 03:10:35.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 03:10:35.621 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 03:10:35.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 03:10:35.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 03:10:35.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 03:10:36.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 03:10:36.090  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 03:10:36.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 03:10:36.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 03:10:36.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 03:10:36.104  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 03:10:36.106 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 03:10:36.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 03:10:36.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 03:10:36.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 03:10:36.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 03:10:36.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 03:10:36.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 03:10:36.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 03:10:36.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 03:10:36.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 03:10:36.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:8b:c0:10:79:2b:a1:e6:72:ed:7c:a4:b6:7f:a5:0b:5c:ca:79:2b]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:19:57.161  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:19:57.164 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:19:57.166 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-25 04:19:57.167 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:19:57.167  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-25 04:19:57.168  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:19:57.168  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:19:57.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:19:57.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:19:57.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:19:57.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:19:57.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:19:57.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:19:57.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:19:57.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:19:57.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:19:57.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:19:57.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:19:57.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:19:57.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:19:57.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:19:57.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:19:57.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:19:57.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:19:57.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:19:57.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:19:57.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:19:57.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:19:57.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:19:57.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:19:57.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:70:b7:1e:19:4f:6f:18:86:63:ad:94:4c:83:49:09:f6:96:37:9d]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:20:10.173  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:20:10.174 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:20:10.176 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:20:10.177 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:20:10.177  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:20:10.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:20:10.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:20:10.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:20:10.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:20:10.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:20:10.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:20:10.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:20:10.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:20:10.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:20:10.325  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:20:10.326  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:20:10.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:20:10.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:20:10.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:20:10.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:20:10.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:20:10.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:20:10.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:20:10.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:20:10.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:20:10.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:20:10.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:20:10.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:20:10.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:20:10.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:20:10.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:56:67:1f:ff:57:39:e0:79:29:0c:4c:47:00:1d:3c:6d:11:97:3e]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:21:43.663  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:21:43.663 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:21:43.665 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 04:21:43.665 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:21:43.666  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 04:21:43.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:21:43.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:21:43.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:21:43.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:21:43.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:21:43.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:21:43.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:21:43.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:21:43.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:21:43.791  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:21:43.791  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:21:43.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:21:43.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:21:43.794  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:21:43.794  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:21:43.794 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:21:43.795 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:21:43.795 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:21:43.795 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:21:43.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:21:43.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:21:43.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:21:43.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:21:43.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:21:43.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:21:43.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:15:70:5d:9a:40:1f:0a:a8:15:bb:a3:05:c3:1a:9d:19:f7:9c:80]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:22:51.386  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:22:51.387 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:22:51.388 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 04:22:51.388 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:22:51.388  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 04:22:51.389  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:22:51.389  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:22:51.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:22:51.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:22:51.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:22:51.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:22:51.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:22:51.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:22:51.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:22:51.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:22:51.499  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:22:51.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:22:51.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:22:51.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:22:51.503  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:22:51.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:22:51.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:22:51.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:22:51.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:22:51.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:22:51.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:22:51.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:22:51.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:22:51.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:22:51.507 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:22:51.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:6f:61:20:4d:21:24:ca:e1:f7:3e:98:23:9a:c8:8f:a5:61:88:c0]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:24:26.251  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:24:26.253 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:24:26.255 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 04:24:26.255 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:24:26.255  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 04:24:26.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:24:26.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:24:26.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:24:26.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:24:26.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:24:26.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:24:26.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:24:26.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:24:26.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:24:26.374  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:24:26.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:24:26.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:24:26.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:24:26.377  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:24:26.377  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:24:26.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:26.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:26.378 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:26.378 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:26.378 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:26.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:26.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:26.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:26.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:26.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:24:26.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:6c:34:99:7f:82:0d:c4:d4:d6:58:86:bd:73:fa:bb:4e:7f:8f:1f]
            modulus: ac0ae6b0e69ef0922afa5d436a1094574b117248a1029937b6ca56b12e06ce3ea9f35784ff15ae57eefcfd52daeb4cd06410d4af722ac9c0355b7cf27e32e4c8750a7314635f41273ed567e455255031496fd6305831db00a5e0d09e1fa0aaa00b0ee42635b0503672b6d89469bfcb1891c102ece5ed0322f85a623b86959b218938b5c8947023314adae3b0bfb5d613ceda4323b6b9554daae608f03b1852d677fcadcaf39fcb644b21498f6d64a6da061647a6414e1b8760fd05f0afd5ff741fa2b8c12b8ad6562570fb80e25b9c3cebcc17ddd34bbcad53cde4b0ce6adc85646b4030774b511a7d3358f8d089d4f7d95c3e664c65f78bd70c802c3710768b
    public exponent: 10001

] 
2022-05-25 04:24:41.349  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:24:41.351 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:24:41.354 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:24:41.356 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:24:41.356  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:24:41.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:24:41.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:24:41.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:24:41.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:24:41.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:24:41.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:24:41.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:24:41.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:24:41.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:24:41.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:24:41.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:24:41.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:24:41.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:24:41.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:24:41.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:24:41.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:41.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:41.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:41.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:41.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:41.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:41.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:41.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:41.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:41.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:24:41.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:c1:c8:fa:d4:eb:82:b3:82:6e:42:92:97:46:f7:44:d0:3c:a1:a6]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:24:43.119  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:24:43.120 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:24:43.121 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 04:24:43.121 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:24:43.122  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 04:24:43.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:24:43.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:24:43.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:24:43.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:24:43.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:24:43.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:24:43.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:24:43.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:24:43.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:24:43.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:24:43.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:24:43.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:24:43.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:24:43.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:24:43.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:24:43.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:43.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:43.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:43.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:43.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:43.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:43.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:24:43.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:24:43.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:24:43.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:24:43.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:24:8d:76:51:79:66:71:74:70:51:cd:20:2a:4d:d1:16:56:b0:e1]
            modulus: d0b8d8fea4a0786b88991457473a00972b3aab4ac6a7e2b773d05a60bd18c94e7615245cb4cbec70e535825147ae84be961becd773f1d0056af884ee04317071943b009b99f00ea4a35220fd3694091dbc39039b59dce2122a8ddb8c351c9e03e536d7dca578395ffbadf2fdf846d6ef0b583249dd74308a3768832b4bb4a70a2857272f820bd5c82f2de2a8bc79b35918440b7934b5a6160223bef6519ee34fac413ad58d79082d505bc1a5f32c0741a0f83017d3f1caf009bd554c74deae5675ab0f0acd50fdd38a6994c6737eb84f491024628edee818cdb83e68c20de737c4a7554f640749bc4af1a609c96ee04875c87e2b1871238163668272dc369ae3
    public exponent: 10001

] 
2022-05-25 04:28:32.528  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:28:32.529 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:28:32.530 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:28:32.531 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:28:32.531  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:28:32.531  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:28:32.531  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:28:32.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:28:32.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:28:32.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:28:32.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:28:32.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:28:32.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:28:32.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:28:32.637  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:28:32.638  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:28:32.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:28:32.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:28:32.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:28:32.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:28:32.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:28:32.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:28:32.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:28:32.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:28:32.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:28:32.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:28:32.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:28:32.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:28:32.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:28:32.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:28:32.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:31:7c:99:60:e7:24:43:6a:29:40:46:7e:5a:e7:97:91:2e:85:39]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:32:46.393  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:32:46.395 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:32:46.397 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:32:46.398 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:32:46.398  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:32:46.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:32:46.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:32:46.399 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:32:46.400 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:32:46.400 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:32:46.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:32:46.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:32:46.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:32:46.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:32:46.534  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:32:46.534  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:32:46.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:32:46.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:32:46.536  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:32:46.537  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:32:46.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:32:46.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:32:46.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:32:46.538 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:32:46.538 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:32:46.538 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:32:46.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:32:46.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:32:46.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:32:46.540 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:32:46.542 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:5f:5f:52:b8:0a:5c:96:33:02:89:04:6a:0e:c6:0b:1e:cb:ce:e4]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:36:26.559  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:36:26.560 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:36:26.562 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:36:26.562 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:36:26.563  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:36:26.563  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:36:26.564  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:36:26.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:36:26.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:36:26.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:36:26.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:36:26.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:36:26.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:36:26.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:36:26.693  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:36:26.693  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:36:26.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:36:26.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:36:26.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:36:26.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:36:26.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:36:26.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:36:26.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:36:26.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:36:26.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:36:26.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:36:26.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:36:26.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:36:26.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:36:26.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:36:26.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: a872ce24ab2f7d8a0aa078e2a497eea0c08eca6af8efbf4ee3c20ab4850d6bc24078e4ddf9ca9a96aa5aeef2a4b93699f518df3876c93281334b97eab9864b85f4e2f7b547f0e37f574f294a765833f06d8314a5b63b5597ca1362199956dfbd906ca4fab8276f8b6fe44e8350350c926519f34d0626b5d06d677d7a1d623b4307ac5c9007f1831993e064404d487d4475ef62fcfdf43362a7778dc54ba8bf84fb36cdfcaab79b1117d23330bd106fac8913ee1db674b0a119172be548d6853efe93c7f792ff262808e32651f3ed47a8a2b250f3d87d92fa1e57cf02bd64bd7da3eb8ec6b6d15ce73ed157847d96e58d9aa29b62de87806a6a65a0a502a4ab3ace28165005d3a5560bde9e60f8cdaf112fcc47c7c5ed5be74e317010a175df8d1a1b625a9ef9a69a70675ee2af22e4eebef0abab5e31065d25b758e6979de25308c429814aad2accc4ebbead8b393508081b42d3101f2e823fc75c6340f9acc641be1d371447f78297dff2d025d740f07480aeac8f9eec30d794343a62c3a619
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:c3:1b:7d:3e:7a:08:6c:b9:61:46:aa:6d:5f:5a:31:f1:a6:99:19]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:39:56.903  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:39:56.905 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:39:56.907 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:39:56.907 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:39:56.908  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:39:56.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:39:56.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:39:56.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:39:56.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:39:56.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:39:56.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:39:56.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:39:56.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:39:56.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:39:57.025  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:39:57.025  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:39:57.026 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:39:57.026 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:39:57.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:39:57.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:39:57.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:39:57.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:39:57.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:39:57.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:39:57.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:39:57.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:39:57.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:39:57.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:39:57.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:39:57.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:39:57.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:f7:2c:45:3d:a0:04:f3:2b:a5:23:9e:c3:52:5a:b0:a2:98:56:a6]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 04:43:43.594  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:43:43.595 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:43:43.596 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:43:43.596 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:43:43.596  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:43:43.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:43:43.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:43:43.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:43:43.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:43:43.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:43:43.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:43:43.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:43:43.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:43:43.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:43:43.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:43:43.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:43:43.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:43:43.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:43:43.726  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:43:43.726  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:43:43.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:43:43.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:43:43.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:43:43.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:43:43.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:43:43.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:43:43.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:43:43.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:43:43.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:43:43.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:43:43.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:50:92:ab:b5:24:28:7c:bd:21:0a:9f:2d:2c:16:2c:9c:c2:d0:fd]
            modulus: cedd1d1adefc61c04c458af7278eaf890665c12b15f90b22551bd3d60e2aed49eb64ec755d28a2c418e1828b427a52dae3388224551de9a5119fd7878f04f431377467378e7eafe5368f1c6e18c6a0bba8291657a4ab0e73043762ab4558575316d64dc74113fdd76515fe00cb26fbc300fc49f3810d1cd5d1f72f0f8bb0aea16b450be92a8a033fee9ae470a3a719fac7eba108644cc9917f7ab22c325f14572e3c6064d154209b9210493806e35895beb8b575f70239c4f2e51913fd8ed15d93e6b60eaf55ac5a22ab5094bc99250d3c48f8239396cc409337a527c298aacf6e137b1f13136444e53362764e7f49fc5d248f3028f69f59706df764521eab9f
    public exponent: 10001

] 
2022-05-25 04:47:34.947  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 04:47:34.951 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 04:47:34.952 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:47:34.953 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 04:47:34.953  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 04:47:34.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 04:47:34.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 04:47:34.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 04:47:34.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 04:47:34.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 04:47:34.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 04:47:34.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:47:34.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 04:47:34.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:47:35.062  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 04:47:35.063  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 04:47:35.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 04:47:35.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 04:47:35.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 04:47:35.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 04:47:35.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:47:35.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:47:35.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:47:35.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:47:35.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:47:35.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:47:35.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 04:47:35.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 04:47:35.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 04:47:35.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 04:47:35.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509580236391800355418021787499458677143967266152
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 03:07:59 UTC 2022
           Final Date: Mon May 24 03:07:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2b:37:a8:3f:81:2d:a4:b2:40:31:49:3b:fa:f2:12:4b:96:38:34]
            modulus: a872ce24ab2f7d8a0aa078e2a497eea0c08eca6af8efbf4ee3c20ab4850d6bc24078e4ddf9ca9a96aa5aeef2a4b93699f518df3876c93281334b97eab9864b85f4e2f7b547f0e37f574f294a765833f06d8314a5b63b5597ca1362199956dfbd906ca4fab8276f8b6fe44e8350350c926519f34d0626b5d06d677d7a1d623b4307ac5c9007f1831993e064404d487d4475ef62fcfdf43362a7778dc54ba8bf84fb36cdfcaab79b1117d23330bd106fac8913ee1db674b0a119172be548d6853efe93c7f792ff262808e32651f3ed47a8a2b250f3d87d92fa1e57cf02bd64bd7da3eb8ec6b6d15ce73ed157847d96e58d9aa29b62de87806a6a65a0a502a4ab3ace28165005d3a5560bde9e60f8cdaf112fcc47c7c5ed5be74e317010a175df8d1a1b625a9ef9a69a70675ee2af22e4eebef0abab5e31065d25b758e6979de25308c429814aad2accc4ebbead8b393508081b42d3101f2e823fc75c6340f9acc641be1d371447f78297dff2d025d740f07480aeac8f9eec30d794343a62c3a619
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97dfdb0f6d5c6a51dc99c0bb98e09e75f4d0c2a1
                       1285534df051e1888537641b746e8ee1b9be9143
                       c9c9cce367c4ca66b8694626d75d409d0e430f41
                       0f2cdd774c3d8724e729723f33ef1fd6656aa9be
                       8f01e65fb7d6baf3c16cc7996ae89a93f9fc5614
                       e65ece53f7273e9133fde080e87b87aad34b2b70
                       ea190690ceae7194c7235467e74bb0c8fe953d63
                       59b4c937b4d4c5280bbb3f3ab3abe3b99229862e
                       59c4564c6988b995dcd524f4ed975d831efcb1c0
                       1d9577a9eb81c8cfc1ab78f25236d934599ac192
                       bc9056b5f90adc3cbc49df374a5f42e71be62df5
                       2eacb0465bba1be95d9ac51bdaf8b8568b138bd8
                       43eca672439a59f320b20c87943d7629786d95c2
                       ab1bd32bc0ad47a035ba5b8ecab26210cd8f9110
                       f83091b394028a2cd1f05fcf84b3d67c0ad6eb16
                       4f300219ef374030979dd8fc4126a5f8c05772e6
                       3abc7ae8c3cee6ba90b3764512f13c66314e49ff
                       948a5a4c614ff784eb5724f7840ed5ca26036bca
                       e010325fe17f4a26ce9f5c7a72735eb0f65f5e4a
                       b2ec68ce
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:b8:29:e2:6c:b1:c2:38:96:39:1a:48:42:65:3a:11:9f:99:c2:6c]
            modulus: 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
    public exponent: 10001

]