Results

By type

          2022-06-15 03:10:04,506 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-15 03:10:06,556 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-15 03:10:07.584  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 15, 2022 3:10:11 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 15, 2022 3:10:11 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 15, 2022 3:10:11 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 15, 2022 3:10:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-15 03:10:11.995 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-15 03:10:12.492  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-15 03:10:12.772  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-15 03:10:14.203 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-15 03:10:14.208 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-15 03:10:14.210 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-15 03:10:14.216 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-15 03:10:14.277 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-15 03:10:14.285 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-15 03:10:14.550 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-15 03:10:15.481 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 15, 2022 3:10:16 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-15 03:10:17.077  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 13.98 seconds (JVM running for 16.814)
Jun 15, 2022 3:10:36 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-15 03:11:13.958  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 03:11:13.974 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 03:11:14.032 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-15 03:11:14.039 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 03:11:14.068  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-15 03:11:14.072  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 03:11:14.075  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 03:11:14.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 03:11:14.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 03:11:14.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 03:11:14.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 03:11:14.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 03:11:14.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 03:11:14.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 03:11:14.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 03:11:14.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 03:11:15.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 03:11:15.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 03:11:15.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 03:11:15.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 03:11:15.054  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 03:11:15.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 03:11:15.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 03:11:15.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 03:11:15.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 03:11:15.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 03:11:15.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 03:11:15.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 03:11:15.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 03:11:15.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 03:11:15.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 03:11:15.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 03:11:15.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:ae:11:60:bb:4d:93:f1:6c:fa:48:38:1e:70:10:92:47:b3:83:08]
            modulus: d64c1df98d83b223a9665c0daabaf96c73143458c9e3a8868317aa30c88daeea92c34b7fb3c61058bba56083e755df926ad563981664ada07f029828afecd6834a7e16d20cc37ad63d669c49bc3b31809e4e2a8b6ce50335330791e69f80888ed7c79a439319f371d3ef3577ca6fe24698bb5417217ec1cdfad8f1db8a87f56ec19e43996dfbd7297c042798e5fbee2afa7680df4f6743514a2aad33090d6d1fcd2b2d1ee4711602217d5a67ff77c3de879a46039f35424a0c4eeedabb046058081a49247f5afe45ff4150dbb5c83985fcddc6a4be655bc128e00e5795c41fd32ea00832c29ed326ab0c4e64f17d71af14ac707ad9e729e528e7b9e40d79090b
    public exponent: 10001

] 
2022-06-15 04:33:47.175  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:33:47.179 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:33:47.184 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:33:47.186 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:33:47.187  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:33:47.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:33:47.189  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:33:47.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:33:47.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:33:47.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:33:47.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:33:47.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:33:47.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:33:47.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:33:47.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:33:47.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:33:47.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:33:47.529 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:33:47.535  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:33:47.536  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:33:47.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:33:47.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:33:47.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:33:47.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:33:47.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:33:47.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:33:47.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:33:47.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:33:47.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:33:47.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:33:47.574 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:ff:5b:0b:e8:87:82:16:bf:e1:c1:9f:f4:f1:06:10:61:86:47:b9]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:36:39.661  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:36:39.667 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:36:39.670 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:36:39.672 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:36:39.673  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:36:39.674  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:36:39.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:36:39.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:36:39.676 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:36:39.676 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:36:39.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:36:39.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:36:39.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:36:39.688 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:36:39.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:36:39.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:36:39.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:36:39.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:36:39.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:36:39.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:36:39.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:36:39.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:36:39.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:36:39.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:36:39.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:36:39.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:36:39.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:36:39.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:36:39.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:36:39.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:36:39.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:9a:b5:3e:39:1a:22:f2:e3:5d:ec:e8:2e:b1:1a:53:7b:29:1a:99]
            modulus: eebe27b330245f000929518e6f862736794dd85e3dceffa78264ef63461b8b9bd50f0ac4098eb736daf569095306e7adc1c11a0b99fd2ff80f8a18431a9101f33014def27426735505a6d645061f47d3a7a57f79854c820c3bb91ef91f4f6368fc66593f8efdbe24c0e391a3ec7d5dd602729c8a9ffa2db6d953c56c9a03a9630faef6985b3ed5606f31ac2e363d8f53d591b6a1fa4ab402b9138d78fc6a80a2d47d8960d074f3f6d6580d63354632c180c234ac0bb4e4e9f197daad1170e0b6da65674048331d09158dd7c2d31f265b061fdad35c9c0364494892809321b0488acd7f8a857da4199e820f17632387ef1a54a6aeb1e98237abed62ca66cb4273
    public exponent: 10001

] 
2022-06-15 04:38:27.785  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:38:27.789 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:38:27.793 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-15 04:38:27.794 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:38:27.795  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-15 04:38:27.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:38:27.803  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:38:27.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:38:27.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:38:27.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:38:27.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:38:27.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:38:27.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:38:27.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:38:28.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:38:28.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:38:28.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:38:28.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:38:28.090  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:38:28.091  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:38:28.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:38:28.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:38:28.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:38:28.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:38:28.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:38:28.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:38:28.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:38:28.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:38:28.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:38:28.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:38:28.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: efb95bccc5eb1097cc6526ba030f7b9de02e3be346354c10d0e65ad096ee9f1289e4bee58dedb9f6af04dbaa9cf9938fc28373e7dd2645da8723a0a0b80518a3d6f0dae7f8870d3faa4de267f2a1dfdc4bc98473bb4599dab3afc8464562ccc3f0c67bdadad99dd910ed9a0263f7be219f0364e65d12543aa0b41928359dafa425492670beb5c933cb7fb1a08d0a937c5afc22d1b59cfb33fd9fec138df657e90d0ac6ca5ee7c1b408fe041cda6fb70acb8a7ed32cdbba664a15652c4f6e7be3f6a03285281bab0c695459d8723f183979050a19ecbab95ece9a9874162aa09b82a7f1a468c8761a3f38057273d7a24b575d372d1eadbdd5c2e7463c626d5f8475c64d13cbccf13dbd48e16b35ad6bd3d373e05610335fa1b80afa9d12149f654f2f3589c33f1035ad6fd72a3556b6248e580909b76b872e7ef2aca2da43e4b83f8c57bd498e17d96b1c4754c38ea83db2f395ad107faa6b22fcf7a4feef2364de8605a2e90466d4bdaba7f1a2c63a71e70c3f41503e708d8ff3250904221993
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:57:56:f7:fc:db:f8:ee:d3:ea:bf:d9:b1:cf:49:4e:ef:99:da:fe]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:39:55.661  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:39:55.663 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:39:55.666 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-15 04:39:55.666 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:39:55.667  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-15 04:39:55.669  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:39:55.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:39:55.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:39:55.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:39:55.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:39:55.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:39:55.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:39:55.682 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:39:55.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:39:55.890  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:39:55.891  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:39:55.892 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:39:55.892 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:39:55.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:39:55.899  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:39:55.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:39:55.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:39:55.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:39:55.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:39:55.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:39:55.902 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:39:55.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:39:55.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:39:55.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:39:55.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:39:55.910 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: efb95bccc5eb1097cc6526ba030f7b9de02e3be346354c10d0e65ad096ee9f1289e4bee58dedb9f6af04dbaa9cf9938fc28373e7dd2645da8723a0a0b80518a3d6f0dae7f8870d3faa4de267f2a1dfdc4bc98473bb4599dab3afc8464562ccc3f0c67bdadad99dd910ed9a0263f7be219f0364e65d12543aa0b41928359dafa425492670beb5c933cb7fb1a08d0a937c5afc22d1b59cfb33fd9fec138df657e90d0ac6ca5ee7c1b408fe041cda6fb70acb8a7ed32cdbba664a15652c4f6e7be3f6a03285281bab0c695459d8723f183979050a19ecbab95ece9a9874162aa09b82a7f1a468c8761a3f38057273d7a24b575d372d1eadbdd5c2e7463c626d5f8475c64d13cbccf13dbd48e16b35ad6bd3d373e05610335fa1b80afa9d12149f654f2f3589c33f1035ad6fd72a3556b6248e580909b76b872e7ef2aca2da43e4b83f8c57bd498e17d96b1c4754c38ea83db2f395ad107faa6b22fcf7a4feef2364de8605a2e90466d4bdaba7f1a2c63a71e70c3f41503e708d8ff3250904221993
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:f8:5d:1e:11:7e:f3:a0:22:9e:e4:fd:b9:b6:4c:81:ea:21:d0:04]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:41:03.185  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:41:03.186 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:41:03.188 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:41:03.189 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:41:03.189  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:41:03.195  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:41:03.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:41:03.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:41:03.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:41:03.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:41:03.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:41:03.236 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:41:03.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:41:03.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:41:03.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:41:03.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:41:03.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:41:03.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:41:03.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:41:03.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:41:03.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:41:03.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:41:03.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:41:03.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:41:03.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:41:03.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:41:03.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:41:03.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:41:03.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:41:03.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:41:03.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:0c:61:19:6a:47:a4:de:da:ac:b1:ee:a9:17:d5:8c:62:6d:8d:80]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:45:35.568  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:45:35.572 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:45:35.577 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:45:35.579 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:45:35.580  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:45:35.581  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:45:35.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:45:35.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:45:35.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:45:35.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:45:35.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:45:35.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:45:35.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:45:35.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:45:35.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:45:35.878  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:45:35.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:45:35.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:45:35.885  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:45:35.887  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:45:35.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:45:35.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:45:35.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:45:35.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:45:35.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:45:35.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:45:35.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:45:35.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:45:35.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:45:35.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:45:35.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:68:6d:f9:1e:79:53:cd:64:bf:d0:aa:3d:c5:c7:af:19:36:f1:35]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:47:55.814  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:47:55.818 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:47:55.827 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-15 04:47:55.836 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:47:55.837  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-15 04:47:55.839  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:47:55.840  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:47:55.840 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:47:55.841 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:47:55.841 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:47:55.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:47:55.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:47:55.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:47:55.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:47:56.092  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:47:56.093  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:47:56.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:47:56.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:47:56.095  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:47:56.095  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:47:56.095 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:47:56.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:47:56.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:47:56.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:47:56.098 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:47:56.098 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:47:56.098 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:47:56.099 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:47:56.099 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:47:56.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:47:56.106 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: efb95bccc5eb1097cc6526ba030f7b9de02e3be346354c10d0e65ad096ee9f1289e4bee58dedb9f6af04dbaa9cf9938fc28373e7dd2645da8723a0a0b80518a3d6f0dae7f8870d3faa4de267f2a1dfdc4bc98473bb4599dab3afc8464562ccc3f0c67bdadad99dd910ed9a0263f7be219f0364e65d12543aa0b41928359dafa425492670beb5c933cb7fb1a08d0a937c5afc22d1b59cfb33fd9fec138df657e90d0ac6ca5ee7c1b408fe041cda6fb70acb8a7ed32cdbba664a15652c4f6e7be3f6a03285281bab0c695459d8723f183979050a19ecbab95ece9a9874162aa09b82a7f1a468c8761a3f38057273d7a24b575d372d1eadbdd5c2e7463c626d5f8475c64d13cbccf13dbd48e16b35ad6bd3d373e05610335fa1b80afa9d12149f654f2f3589c33f1035ad6fd72a3556b6248e580909b76b872e7ef2aca2da43e4b83f8c57bd498e17d96b1c4754c38ea83db2f395ad107faa6b22fcf7a4feef2364de8605a2e90466d4bdaba7f1a2c63a71e70c3f41503e708d8ff3250904221993
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:77:e4:19:8f:ba:a2:15:8f:80:6b:ec:c5:34:2b:35:8e:d5:9a:8c]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:49:52.575  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:49:52.577 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:49:52.579 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:49:52.580 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:49:52.580  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:49:52.581  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:49:52.581  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:49:52.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:49:52.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:49:52.596 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:49:52.603 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:49:52.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:49:52.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:49:52.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:49:52.756  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:49:52.757  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:49:52.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:49:52.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:49:52.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:49:52.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:49:52.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:49:52.762 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:49:52.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:49:52.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:49:52.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:49:52.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:49:52.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:49:52.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:49:52.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:49:52.770 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:49:52.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:d8:ca:0f:0c:74:d1:1f:6f:05:43:be:5b:b8:d3:1b:fd:12:0a:96]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:52:54.893  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:52:54.896 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:52:54.899 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-15 04:52:54.900 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:52:54.900  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-15 04:52:54.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:52:54.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:52:54.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:52:54.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:52:54.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:52:54.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:52:54.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:52:54.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:52:54.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:52:55.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:52:55.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:52:55.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:52:55.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:52:55.141  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:52:55.142  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:52:55.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:52:55.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:52:55.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:52:55.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:52:55.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:52:55.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:52:55.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:52:55.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:52:55.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:52:55.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:52:55.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: efb95bccc5eb1097cc6526ba030f7b9de02e3be346354c10d0e65ad096ee9f1289e4bee58dedb9f6af04dbaa9cf9938fc28373e7dd2645da8723a0a0b80518a3d6f0dae7f8870d3faa4de267f2a1dfdc4bc98473bb4599dab3afc8464562ccc3f0c67bdadad99dd910ed9a0263f7be219f0364e65d12543aa0b41928359dafa425492670beb5c933cb7fb1a08d0a937c5afc22d1b59cfb33fd9fec138df657e90d0ac6ca5ee7c1b408fe041cda6fb70acb8a7ed32cdbba664a15652c4f6e7be3f6a03285281bab0c695459d8723f183979050a19ecbab95ece9a9874162aa09b82a7f1a468c8761a3f38057273d7a24b575d372d1eadbdd5c2e7463c626d5f8475c64d13cbccf13dbd48e16b35ad6bd3d373e05610335fa1b80afa9d12149f654f2f3589c33f1035ad6fd72a3556b6248e580909b76b872e7ef2aca2da43e4b83f8c57bd498e17d96b1c4754c38ea83db2f395ad107faa6b22fcf7a4feef2364de8605a2e90466d4bdaba7f1a2c63a71e70c3f41503e708d8ff3250904221993
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:5b:f0:c7:6f:23:89:5c:ad:91:2d:7f:37:15:dd:60:06:13:67:50]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:53:11.826  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:53:11.827 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:53:11.829 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-15 04:53:11.829 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:53:11.829  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-15 04:53:11.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:53:11.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:53:11.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:53:11.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:53:11.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:53:11.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:53:11.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:53:11.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:53:11.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:53:12.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:53:12.050  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:53:12.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:53:12.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:53:12.053  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:53:12.053  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:53:12.053 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:53:12.054 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:53:12.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:53:12.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:53:12.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:53:12.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:53:12.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:53:12.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:53:12.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:53:12.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:53:12.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:cc:e8:4a:44:5e:64:af:18:e5:fe:99:1f:72:61:b5:ec:8b:cc:75]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:55:07.954  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:55:07.957 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:55:07.962 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:55:07.964 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:55:07.964  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:55:07.965  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:55:07.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:55:07.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:55:07.968 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:55:07.968 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:55:07.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:55:07.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:55:07.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:55:07.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:55:08.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:55:08.169  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:55:08.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:55:08.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:55:08.173  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:55:08.173  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:55:08.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:55:08.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:55:08.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:55:08.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:55:08.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:55:08.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:55:08.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:55:08.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:55:08.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:55:08.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:55:08.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: efb95bccc5eb1097cc6526ba030f7b9de02e3be346354c10d0e65ad096ee9f1289e4bee58dedb9f6af04dbaa9cf9938fc28373e7dd2645da8723a0a0b80518a3d6f0dae7f8870d3faa4de267f2a1dfdc4bc98473bb4599dab3afc8464562ccc3f0c67bdadad99dd910ed9a0263f7be219f0364e65d12543aa0b41928359dafa425492670beb5c933cb7fb1a08d0a937c5afc22d1b59cfb33fd9fec138df657e90d0ac6ca5ee7c1b408fe041cda6fb70acb8a7ed32cdbba664a15652c4f6e7be3f6a03285281bab0c695459d8723f183979050a19ecbab95ece9a9874162aa09b82a7f1a468c8761a3f38057273d7a24b575d372d1eadbdd5c2e7463c626d5f8475c64d13cbccf13dbd48e16b35ad6bd3d373e05610335fa1b80afa9d12149f654f2f3589c33f1035ad6fd72a3556b6248e580909b76b872e7ef2aca2da43e4b83f8c57bd498e17d96b1c4754c38ea83db2f395ad107faa6b22fcf7a4feef2364de8605a2e90466d4bdaba7f1a2c63a71e70c3f41503e708d8ff3250904221993
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:5a:d1:87:70:71:b7:c2:7c:b0:7b:00:6f:6d:7a:70:e8:c1:1b:e4]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 04:59:57.971  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 04:59:57.974 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 04:59:57.977 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:59:57.978 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 04:59:57.978  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 04:59:57.980  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 04:59:57.981  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 04:59:57.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 04:59:57.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 04:59:57.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 04:59:57.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 04:59:57.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:59:57.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 04:59:57.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:59:58.217  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 04:59:58.218  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 04:59:58.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 04:59:58.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 04:59:58.221  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 04:59:58.222  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 04:59:58.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:59:58.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:59:58.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:59:58.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:59:58.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:59:58.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:59:58.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 04:59:58.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 04:59:58.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 04:59:58.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 04:59:58.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:4e:29:9a:88:ad:f3:d3:64:b2:ae:83:28:20:f0:2c:1a:2b:e4:16]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 05:04:01.670  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 05:04:01.672 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 05:04:01.674 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 05:04:01.677 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 05:04:01.689  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 05:04:01.690  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 05:04:01.691  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 05:04:01.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 05:04:01.692 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 05:04:01.692 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 05:04:01.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 05:04:01.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 05:04:01.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 05:04:01.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 05:04:01.929  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 05:04:01.930  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 05:04:01.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 05:04:01.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 05:04:01.934  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 05:04:01.935  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 05:04:01.937 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:04:01.938 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:04:01.938 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:04:01.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:04:01.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:04:01.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:04:01.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:04:01.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:04:01.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:04:01.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 05:04:01.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:08:14:e2:35:db:a6:1a:7f:37:73:dd:4f:ef:55:d9:1b:56:b9:02]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 05:08:58.550  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 05:08:58.553 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 05:08:58.556 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 05:08:58.558 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 05:08:58.559  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 05:08:58.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 05:08:58.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 05:08:58.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 05:08:58.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 05:08:58.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 05:08:58.569 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 05:08:58.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 05:08:58.571 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 05:08:58.571 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 05:08:58.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 05:08:58.792  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 05:08:58.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 05:08:58.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 05:08:58.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 05:08:58.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 05:08:58.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:08:58.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:08:58.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:08:58.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:08:58.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:08:58.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:08:58.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:08:58.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:08:58.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:08:58.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 05:08:58.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:e1:4b:c9:4a:07:01:27:39:02:99:04:91:db:e9:66:11:6b:a9:31]
            modulus: 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
    public exponent: 10001

] 
2022-06-15 05:13:03.071  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-15 05:13:03.073 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-15 05:13:03.077 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 05:13:03.078 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-15 05:13:03.079  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-15 05:13:03.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-15 05:13:03.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-15 05:13:03.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-15 05:13:03.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-15 05:13:03.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-15 05:13:03.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-15 05:13:03.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 05:13:03.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-15 05:13:03.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 05:13:03.394  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-15 05:13:03.395  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-15 05:13:03.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-15 05:13:03.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-15 05:13:03.412  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-15 05:13:03.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-15 05:13:03.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:13:03.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:13:03.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:13:03.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:13:03.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:13:03.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:13:03.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-15 05:13:03.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-15 05:13:03.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-15 05:13:03.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-15 05:13:03.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299858137395742573451994593491972346733304708588
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 15 03:07:28 UTC 2022
           Final Date: Mon Jun 14 03:07:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2b:ed:36:40:23:0e:af:f2:ad:45:b6:a8:ef:61:9f:41:77:c5:4c:07]
            modulus: efb95bccc5eb1097cc6526ba030f7b9de02e3be346354c10d0e65ad096ee9f1289e4bee58dedb9f6af04dbaa9cf9938fc28373e7dd2645da8723a0a0b80518a3d6f0dae7f8870d3faa4de267f2a1dfdc4bc98473bb4599dab3afc8464562ccc3f0c67bdadad99dd910ed9a0263f7be219f0364e65d12543aa0b41928359dafa425492670beb5c933cb7fb1a08d0a937c5afc22d1b59cfb33fd9fec138df657e90d0ac6ca5ee7c1b408fe041cda6fb70acb8a7ed32cdbba664a15652c4f6e7be3f6a03285281bab0c695459d8723f183979050a19ecbab95ece9a9874162aa09b82a7f1a468c8761a3f38057273d7a24b575d372d1eadbdd5c2e7463c626d5f8475c64d13cbccf13dbd48e16b35ad6bd3d373e05610335fa1b80afa9d12149f654f2f3589c33f1035ad6fd72a3556b6248e580909b76b872e7ef2aca2da43e4b83f8c57bd498e17d96b1c4754c38ea83db2f395ad107faa6b22fcf7a4feef2364de8605a2e90466d4bdaba7f1a2c63a71e70c3f41503e708d8ff3250904221993
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8259d1c346c42a18da0ef796c520d4d435f14ede
                       2924ec2a5a42536e6cd2ea259bbb834d88b20364
                       091ea95f74579bb00e0a807f3ca1a85dbee8c884
                       9a613ec25a8acf5e83e7190b4361c42e553ea8de
                       5e0e381185bc11f667e8a62cc0902deac10d2319
                       07a194fd87eb67fae7466fc6f0913954468a637c
                       1e5334e9984732e25c4fa0153560c7a472b3a607
                       4098ff77f6569d627d9b5c1eb9b9fbadd9193fc3
                       036df025f07d9a195beccd9cd470aa08a1490ab6
                       571dba626b6f54cf1858fc51258c0637b21e058a
                       14952de69b989d588d10243322ca213034d7818d
                       f513b5a3cda6f7ddaac8c6b8f276f96658821bf0
                       7cf40d8a2cc15da1afcf932ce84b4df96f81d4ff
                       20e242530e81ad4f5ce0976877e6061916e739eb
                       dd83201be5d990736993606eb3a36f9aab7fa325
                       d9ef96dd9b7673c9a206ef348aa265498e666916
                       3870ac3debaa503067a04c9054b6aadd06283d3c
                       f12da002d371f5ae7d4f8c9835e16cdf4a2fd869
                       865d0128d05fae8a05f58da63ebbdc0370f2048b
                       fbdb9d7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:2a:1f:bd:0d:8a:af:a1:59:cc:22:a4:64:96:a6:da:b3:59:f4:70]
            modulus: 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
    public exponent: 10001

]