Results

By type

          2022-06-16 03:11:57,389 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-16 03:11:58,418 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-16 03:11:59.135  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 16, 2022 3:12:00 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 16, 2022 3:12:00 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 16, 2022 3:12:00 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 16, 2022 3:12:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-16 03:12:01.608 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-16 03:12:01.905  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-16 03:12:02.089  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-16 03:12:02.826 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-16 03:12:02.829 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-16 03:12:02.830 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-16 03:12:02.833 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-16 03:12:02.872 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-16 03:12:02.876 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-16 03:12:03.014 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-16 03:12:03.693 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 16, 2022 3:12:04 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-16 03:12:04.638  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.069 seconds (JVM running for 9.885)
Jun 16, 2022 3:12:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-16 03:12:46.878  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 03:12:46.886 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 03:12:46.927 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-16 03:12:46.931 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 03:12:46.949  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-16 03:12:46.951  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 03:12:46.952  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 03:12:46.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 03:12:46.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 03:12:46.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 03:12:46.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 03:12:46.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 03:12:47.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 03:12:47.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 03:12:47.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 03:12:47.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 03:12:47.562  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 03:12:47.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 03:12:47.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 03:12:47.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 03:12:47.575  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 03:12:47.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 03:12:47.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 03:12:47.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 03:12:47.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 03:12:47.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 03:12:47.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 03:12:47.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 03:12:47.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 03:12:47.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 03:12:47.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 03:12:47.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 03:12:47.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: ce83a7ce7b1f6b4908cb95c9c5f89f886f2826484b3492f6683b52793925029bee160cb0bbd520436459916b0ca7df5bcd223395708d9f77e3dd1139c82e53eb3cabf88ebdbd3b53d28c2de58ab383ff4a32295569039cf1fa9a5d04cd79f0b6330927838ec3ff6645309f8e05639961ed40b29c495a53f5fb06d9a2afb5ad171ca1ee6e28cd586ffa476960006edccf463c0ddb7fab7b3135a3c9779266f71cd0f81af4159c94e60b20f4a2bec3cd51d0ff21bc9f84365da2d93887992729173c936b80013e34f7e02dcd77c9ac4343cfaca45585143f20497ad331fb9f537f1aae9230ae46d3317f4b80c85d6d06fc0b36edec1e46d0832f6c535c3b2ad7eee1b38cce2faf570337fd6b1fb49e91e43dc5eea23b43672b712c800c92daa957a22f5e3ec439e276afa280f1a054d9071e13652ecc35b1d2072a765c8db5927e7c0675ca4c29dd3787e21679b5a00d0535a5279b6eef1ac101b597da09b30f247528035fbfca1125d3e70d2770be2daeca8998bfa2c96808f9e413df5f55e997
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:bc:4c:ae:87:c2:41:81:e3:9f:ee:d6:e4:05:22:43:b6:5c:34:c4]
            modulus: ec32c8eb6d742eed269620ccff0716a84ffbd2e0dcb673cbdcc802a70d09417d43b3dfb25a4fc2a342c52d102d95ac308140dff319a973c83506505817012afdc1b61dc3a237a34b49cf576589509718b80c415ae35d7fb9cb3b2d9a9158569a223e41b4d9e65b0128fe9b0a442313e946b332b89f2219d32c68ffeae79f1cdcaa69d67f83472b23472b665c98408151f640f83b095a39c18d5ba122003fda4881858ceb30f50348d2f8e43a9b1d75329ab449472a4a311f3b080cd09d3c8662abf595bfd0d020b3e4c9011cbbc8da8a79e33ea527e148f2bfae292b50acc68e9e0149cc95c53308cc417784337a6717bbac629ec5ded56db2064fd6b6d142e3
    public exponent: 10001

] 
2022-06-16 04:34:10.058  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:34:10.063 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:34:10.067 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:34:10.069 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:34:10.070  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:34:10.071  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:34:10.072  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:34:10.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:34:10.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:34:10.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:34:10.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:34:10.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:34:10.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:34:10.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:34:10.279  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:34:10.280  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:34:10.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:34:10.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:34:10.286  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:34:10.288  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:34:10.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:34:10.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:34:10.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:34:10.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:34:10.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:34:10.294 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:34:10.296 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:34:10.296 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:34:10.297 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:34:10.299 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:34:10.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:1a:27:1b:b5:43:b5:1b:0e:21:bd:7e:c1:cf:25:58:c1:06:9e:60]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 04:35:59.614  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:35:59.615 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:35:59.617 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-16 04:35:59.618 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:35:59.618  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-16 04:35:59.619  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:35:59.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:35:59.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:35:59.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:35:59.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:35:59.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:35:59.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:35:59.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:35:59.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:35:59.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:35:59.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:35:59.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:35:59.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:35:59.811  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:35:59.812  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:35:59.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:35:59.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:35:59.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:35:59.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:35:59.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:35:59.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:35:59.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:35:59.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:35:59.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:35:59.819 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:35:59.824 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:e6:12:57:9a:03:5e:e2:f9:e6:c6:b8:7f:2a:58:d3:f9:58:22:ba]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 04:37:27.141  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:37:27.142 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:37:27.144 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-16 04:37:27.144 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:37:27.145  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-16 04:37:27.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:37:27.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:37:27.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:37:27.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:37:27.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:37:27.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:37:27.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:37:27.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:37:27.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:37:27.434  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:37:27.435  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:37:27.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:37:27.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:37:27.438  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:37:27.439  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:37:27.440 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:37:27.440 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:37:27.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:37:27.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:37:27.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:37:27.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:37:27.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:37:27.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:37:27.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:37:27.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:37:27.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:65:5e:a2:c0:ff:e7:90:b2:78:05:13:16:4d:7b:19:0f:14:d1:87]
            modulus: ae59bd1e57f4e505ba94e75197211cb9c9d70971ece5993e91dbca4d48168e34659e47e105dae52dffb506ffdb19a7b58c0cc835766ea8aa8c3abab69b3a095152f73d1c1edf16a2c5d8d70d56bf24d4ca01823142399151e198bdbad63708c5766e50f0317c7a1d63f5059c7748858b37b9f1d8851f25448e8e8e76c773ae9a8f8646c905aeba9ff75e93546e04cbc12a6d1967e0c4429fd1142b7eeaa561f9bf62a9c83f403b8f0c1cf260ea62ea4cb685033d0e2f0eab0ce19a7ba3e2f6df93ab8e7f37aed743e29ff2790c4a29eb444ac8026f26c44160ca2bc19c3410326dc1eb6f756bd9d0059533875a92bc6b67307ceb1cf0d4a9dfa565f5d67c4565
    public exponent: 10001

] 
2022-06-16 04:39:23.666  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:39:23.668 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:39:23.670 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:39:23.670 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:39:23.671  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:39:23.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:39:23.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:39:23.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:39:23.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:39:23.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:39:23.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:39:23.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:39:23.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:39:23.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:39:23.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:39:23.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:39:23.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:39:23.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:39:23.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:39:23.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:39:23.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:39:23.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:39:23.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:39:23.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:39:23.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:39:23.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:39:23.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:39:23.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:39:23.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:39:23.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:39:23.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:ec:42:82:be:e4:0d:b6:15:2e:3f:4f:29:0c:d1:3e:02:4e:d8:3e]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 04:43:48.054  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:43:48.058 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:43:48.061 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:43:48.063 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:43:48.063  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:43:48.064  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:43:48.064  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:43:48.064 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:43:48.065 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:43:48.065 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:43:48.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:43:48.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:43:48.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:43:48.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:43:48.261  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:43:48.261  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:43:48.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:43:48.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:43:48.264  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:43:48.265  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:43:48.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:43:48.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:43:48.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:43:48.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:43:48.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:43:48.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:43:48.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:43:48.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:43:48.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:43:48.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:43:48.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:c0:15:94:fe:37:d5:02:68:bf:f9:43:f2:ae:19:44:b3:fb:5a:49]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 04:48:53.196  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:48:53.199 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:48:53.202 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:48:53.203 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:48:53.204  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:48:53.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:48:53.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:48:53.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:48:53.207 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:48:53.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:48:53.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:48:53.214 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:48:53.214 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:48:53.215 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:48:53.349  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:48:53.350  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:48:53.351 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:48:53.351 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:48:53.353  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:48:53.354  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:48:53.354 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:48:53.355 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:48:53.355 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:48:53.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:48:53.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:48:53.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:48:53.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:48:53.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:48:53.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:48:53.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:48:53.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:74:85:f4:44:c4:78:85:05:55:f9:3e:c6:e3:02:03:09:cc:87:22]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 04:53:26.223  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:53:26.225 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:53:26.226 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:53:26.227 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:53:26.228  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-16 04:53:26.228  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:53:26.229  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:53:26.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:53:26.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:53:26.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:53:26.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:53:26.236 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:53:26.236 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:53:26.236 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:53:26.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:53:26.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:53:26.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:53:26.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:53:26.436  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:53:26.436  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:53:26.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:53:26.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:53:26.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:53:26.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:53:26.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:53:26.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:53:26.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:53:26.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:53:26.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:53:26.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:53:26.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: ce83a7ce7b1f6b4908cb95c9c5f89f886f2826484b3492f6683b52793925029bee160cb0bbd520436459916b0ca7df5bcd223395708d9f77e3dd1139c82e53eb3cabf88ebdbd3b53d28c2de58ab383ff4a32295569039cf1fa9a5d04cd79f0b6330927838ec3ff6645309f8e05639961ed40b29c495a53f5fb06d9a2afb5ad171ca1ee6e28cd586ffa476960006edccf463c0ddb7fab7b3135a3c9779266f71cd0f81af4159c94e60b20f4a2bec3cd51d0ff21bc9f84365da2d93887992729173c936b80013e34f7e02dcd77c9ac4343cfaca45585143f20497ad331fb9f537f1aae9230ae46d3317f4b80c85d6d06fc0b36edec1e46d0832f6c535c3b2ad7eee1b38cce2faf570337fd6b1fb49e91e43dc5eea23b43672b712c800c92daa957a22f5e3ec439e276afa280f1a054d9071e13652ecc35b1d2072a765c8db5927e7c0675ca4c29dd3787e21679b5a00d0535a5279b6eef1ac101b597da09b30f247528035fbfca1125d3e70d2770be2daeca8998bfa2c96808f9e413df5f55e997
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:63:09:fa:2c:b4:0e:46:4f:57:a2:4f:7a:38:1f:c3:42:5c:93:67]
            modulus: b89d5cdf8e47dc05e9de2da59c0cde31827872a55cf447a5b8d7d0beded70d1109be2a962dcdf889b6299b27355085a0c5a93f487d72002c16bf7fb527da1e105d10d602392c478764b69b340ab1bfce1a8bd4f986167bc40f97662a9e98047617692111618a093fa44bd3c5f12069d099219a10c9695a2d6629cc69bc2b289aa5e629b16241caabd4c11b4fddd8e6007d75e8f00a80bff7f2845834805490aad356c6ddf7fa24f46d377ee34e700b7e9c07454b35e890111bd5765507060e651da2c77e3c7fdf9e5fa6d1553eab0762cd9d2584c1713bffe74682d3f17d3c17eced35c4c2ca11094d452e7f38362f7711e12c474401f9bedb24d88b330b8005
    public exponent: 10001

] 
2022-06-16 04:55:23.627  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 04:55:23.629 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 04:55:23.631 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-16 04:55:23.632 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 04:55:23.632  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-16 04:55:23.633  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 04:55:23.634  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 04:55:23.634 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 04:55:23.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 04:55:23.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 04:55:23.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 04:55:23.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:55:23.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 04:55:23.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:55:23.847  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 04:55:23.848  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 04:55:23.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 04:55:23.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 04:55:23.850  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 04:55:23.851  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 04:55:23.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:55:23.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:55:23.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:55:23.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:55:23.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:55:23.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:55:23.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 04:55:23.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 04:55:23.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 04:55:23.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 04:55:23.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:03:76:b8:eb:ad:b6:81:d4:58:16:fe:35:d9:2c:0e:e8:0f:be:4f]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 05:02:13.591  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 05:02:13.594 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 05:02:13.596 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-16 05:02:13.597 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 05:02:13.597  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-16 05:02:13.598  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 05:02:13.599  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 05:02:13.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 05:02:13.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 05:02:13.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 05:02:13.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 05:02:13.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 05:02:13.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 05:02:13.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 05:02:13.793  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 05:02:13.794  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 05:02:13.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 05:02:13.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 05:02:13.797  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 05:02:13.797  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 05:02:13.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 05:02:13.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 05:02:13.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 05:02:13.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 05:02:13.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 05:02:13.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 05:02:13.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 05:02:13.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 05:02:13.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 05:02:13.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 05:02:13.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:43:e7:42:7b:66:33:8d:75:85:56:29:9c:a6:fa:81:43:7f:b2:ba]
            modulus: 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
    public exponent: 10001

] 
2022-06-16 05:02:36.710  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-16 05:02:36.711 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-16 05:02:36.713 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-16 05:02:36.713 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-16 05:02:36.714  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-16 05:02:36.714  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-16 05:02:36.715  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-16 05:02:36.715 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-16 05:02:36.716 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-16 05:02:36.716 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-16 05:02:36.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-16 05:02:36.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 05:02:36.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-16 05:02:36.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 05:02:36.838  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-16 05:02:36.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-16 05:02:36.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-16 05:02:36.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-16 05:02:36.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-16 05:02:36.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-16 05:02:36.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 05:02:36.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 05:02:36.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 05:02:36.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 05:02:36.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 05:02:36.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 05:02:36.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-16 05:02:36.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-16 05:02:36.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-16 05:02:36.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-16 05:02:36.850 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224276314066813688738987306153884400504420754389
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 16 03:09:47 UTC 2022
           Final Date: Tue Jun 15 03:09:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:80:00:eb:12:58:44:38:43:05:ba:b9:a0:6a:87:64:f5:e3:5e:1f]
            modulus: ce83a7ce7b1f6b4908cb95c9c5f89f886f2826484b3492f6683b52793925029bee160cb0bbd520436459916b0ca7df5bcd223395708d9f77e3dd1139c82e53eb3cabf88ebdbd3b53d28c2de58ab383ff4a32295569039cf1fa9a5d04cd79f0b6330927838ec3ff6645309f8e05639961ed40b29c495a53f5fb06d9a2afb5ad171ca1ee6e28cd586ffa476960006edccf463c0ddb7fab7b3135a3c9779266f71cd0f81af4159c94e60b20f4a2bec3cd51d0ff21bc9f84365da2d93887992729173c936b80013e34f7e02dcd77c9ac4343cfaca45585143f20497ad331fb9f537f1aae9230ae46d3317f4b80c85d6d06fc0b36edec1e46d0832f6c535c3b2ad7eee1b38cce2faf570337fd6b1fb49e91e43dc5eea23b43672b712c800c92daa957a22f5e3ec439e276afa280f1a054d9071e13652ecc35b1d2072a765c8db5927e7c0675ca4c29dd3787e21679b5a00d0535a5279b6eef1ac101b597da09b30f247528035fbfca1125d3e70d2770be2daeca8998bfa2c96808f9e413df5f55e997
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 08891bf4ee61fc7ba2d7939e35f7d390d0b71a65
                       b24114857d0bffa3c49979c06d212f601dda1e13
                       f00cf6b43cc93bf56f604b9887a68844cf07ce0a
                       ed2df47cc156bf9c3f0a0c7b9167c6af340eac34
                       2b6d7bae6aa0c0a600518af9c4a2eb8df33537e3
                       9be0c01b1e017636674475c6be54f629143ecaa1
                       9ec95ff12fbe6cac50eed16211ddcb79b392096e
                       11c7bd98d904f7f3d7508424d7dfd646959e57f8
                       b3a80d42208db9d82900653fe43a360fb32a04ed
                       7af36362ca0e95c82d358a5072e3bfc5982de336
                       af2417ff2eccd55a427ff3b57422ad296ba4b07f
                       b89825f9104e8fff8d537ea7178bb6713a79c9f6
                       d2dc228d66ce2d3b9cfcefe90728499c8eadbf25
                       fced3799ecf105a8f644daf2ca13140e597bb06f
                       9515a57737e1ef91f52569065da1803a441734fe
                       2a2313a7af23797f824b25d27ce808cf3181c114
                       107ea7d96729e7acb389a729d5d7ac13cb65585d
                       a50af8ef69465b3b1a4bfd7aa3e73c3700c951bd
                       d4fce5d948924836cf9143deb6c21a6959960405
                       e0baa435
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:f9:79:1c:5a:76:7e:86:67:db:98:8d:18:09:14:f8:56:ab:e6:65]
            modulus: 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
    public exponent: 10001

]