Results

By type

          2022-06-18 03:15:05,486 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-18 03:15:06,775 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-18 03:15:07.752  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 18, 2022 3:15:10 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 18, 2022 3:15:10 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 18, 2022 3:15:10 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 18, 2022 3:15:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-18 03:15:10.886 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-18 03:15:11.231  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-18 03:15:11.405  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-18 03:15:12.169 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-18 03:15:12.172 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-18 03:15:12.174 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-18 03:15:12.178 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-18 03:15:12.227 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-06-18 03:15:12.231 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-18 03:15:12.375 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-18 03:15:13.022 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 18, 2022 3:15:13 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-18 03:15:14.153  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.799 seconds (JVM running for 11.766)
Jun 18, 2022 3:15:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-18 03:15:59.728  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 03:15:59.741 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 03:15:59.799 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-18 03:15:59.805 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 03:15:59.829  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-18 03:15:59.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 03:15:59.833  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 03:15:59.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 03:15:59.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 03:15:59.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 03:15:59.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 03:15:59.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 03:15:59.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 03:15:59.919 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 03:15:59.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 03:15:59.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 03:16:00.572  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 03:16:00.576  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 03:16:00.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 03:16:00.580 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 03:16:00.591  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 03:16:00.592  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 03:16:00.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 03:16:00.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 03:16:00.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 03:16:00.609 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 03:16:00.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 03:16:00.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 03:16:00.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 03:16:00.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 03:16:00.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 03:16:00.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 03:16:00.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: c66d31571392485c07aec118f1f25753bbd7b93d4ce707393769580be2720ff58eb15d378866baf54f46ccf2cf6e5a7855ae4ded41281cb44fc1407daabf1bcdb57a93d19f038cefe1220169bce581bc36677a125302a88b78e594ae3b1094b4288032829dfa395b8c78cc4b8d8f5aed4915129eb4008324ebf8dcd64e833492545fa343ede36545b540b6aee2d2fd4c9cd6d46541fde8c36fc4ab4a8a4bfd2916590d5bd4d389ade42bbb16d87146d9ad9798fbe0b9fed3f7af719807fdeae58217b87402e8e83021bd4f3a13866eca70f83482452569aa13b92d7f1927f5a47f635d0f73d899096ce037bb1a5f3a49736dbc1fc827d79a4dc13427f89f030bc24df792fba3bd46a7d6a81709d7a44207603cd65ddc052d43c34812395e41938707c6a404bc4c5cd6872771727a63bed0936c847d51ca40bbca8c3fe854a13a053e3ca5213e1789c1a752bed9b40c6783987e161ce1da143ea4f70d07395afa1af8465832cd21cd6a2a65b68c0f97cf4c47202d098752e1c9213990b4be596f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:17:e1:8e:bb:af:6a:44:1c:c4:cd:96:27:fa:47:50:17:e7:c2:e1]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:42:12.793  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:42:12.796 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:42:12.799 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:42:12.800 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:42:12.801  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:42:12.802  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:42:12.803  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:42:12.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:42:12.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:42:12.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:42:12.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:42:12.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:42:12.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:42:12.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:42:12.998  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:42:13.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:42:13.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:42:13.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:42:13.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:42:13.007  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:42:13.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:42:13.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:42:13.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:42:13.011 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:42:13.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:42:13.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:42:13.014 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:42:13.014 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:42:13.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:42:13.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:42:13.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:9b:66:ef:df:84:51:ea:3e:71:06:d7:2e:9d:7c:9a:49:7c:fe:e4]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:45:17.794  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:45:17.796 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:45:17.802 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:45:17.804 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:45:17.805  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:45:17.806  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:45:17.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:45:17.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:45:17.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:45:17.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:45:17.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:45:17.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:45:17.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:45:17.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:45:18.011  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:45:18.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:45:18.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:45:18.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:45:18.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:45:18.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:45:18.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:45:18.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:45:18.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:45:18.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:45:18.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:45:18.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:45:18.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:45:18.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:45:18.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:45:18.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:45:18.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:69:a5:dc:88:08:eb:ff:87:9a:08:4f:27:85:f4:eb:56:ee:54:70]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:46:37.170  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:46:37.172 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:46:37.174 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-18 04:46:37.175 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:46:37.176  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-18 04:46:37.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:46:37.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:46:37.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:46:37.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:46:37.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:46:37.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:46:37.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:46:37.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:46:37.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:46:37.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:46:37.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:46:37.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:46:37.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:46:37.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:46:37.329  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:46:37.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:46:37.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:46:37.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:46:37.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:46:37.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:46:37.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:46:37.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:46:37.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:46:37.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:46:37.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:46:37.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: c66d31571392485c07aec118f1f25753bbd7b93d4ce707393769580be2720ff58eb15d378866baf54f46ccf2cf6e5a7855ae4ded41281cb44fc1407daabf1bcdb57a93d19f038cefe1220169bce581bc36677a125302a88b78e594ae3b1094b4288032829dfa395b8c78cc4b8d8f5aed4915129eb4008324ebf8dcd64e833492545fa343ede36545b540b6aee2d2fd4c9cd6d46541fde8c36fc4ab4a8a4bfd2916590d5bd4d389ade42bbb16d87146d9ad9798fbe0b9fed3f7af719807fdeae58217b87402e8e83021bd4f3a13866eca70f83482452569aa13b92d7f1927f5a47f635d0f73d899096ce037bb1a5f3a49736dbc1fc827d79a4dc13427f89f030bc24df792fba3bd46a7d6a81709d7a44207603cd65ddc052d43c34812395e41938707c6a404bc4c5cd6872771727a63bed0936c847d51ca40bbca8c3fe854a13a053e3ca5213e1789c1a752bed9b40c6783987e161ce1da143ea4f70d07395afa1af8465832cd21cd6a2a65b68c0f97cf4c47202d098752e1c9213990b4be596f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:02:ec:fa:93:c1:c3:88:16:f3:f5:7a:be:5d:3b:6e:e9:82:c6:5c]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:48:27.026  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:48:27.028 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:48:27.030 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-18 04:48:27.031 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:48:27.031  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-18 04:48:27.034  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:48:27.035  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:48:27.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:48:27.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:48:27.038 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:48:27.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:48:27.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:48:27.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:48:27.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:48:27.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:48:27.301  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:48:27.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:48:27.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:48:27.312  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:48:27.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:48:27.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:48:27.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:48:27.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:48:27.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:48:27.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:48:27.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:48:27.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:48:27.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:48:27.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:48:27.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:48:27.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:70:50:3e:02:e0:3b:a2:b8:e9:e5:3c:ab:43:1d:bd:cb:38:c4:7b]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:51:00.538  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:51:00.543 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:51:00.547 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:51:00.549 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:51:00.549  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:51:00.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:51:00.551  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:51:00.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:51:00.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:51:00.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:51:00.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:51:00.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:51:00.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:51:00.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:51:00.743  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:51:00.744  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:51:00.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:51:00.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:51:00.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:51:00.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:51:00.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:51:00.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:51:00.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:51:00.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:51:00.751 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:51:00.751 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:51:00.752 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:51:00.752 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:51:00.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:51:00.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:51:00.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:1f:b5:03:1c:d1:47:35:62:55:9b:b6:bf:bc:1c:41:5e:e2:d2:7d]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:55:40.071  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:55:40.074 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:55:40.077 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:55:40.078 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:55:40.078  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:55:40.079  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:55:40.079  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:55:40.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:55:40.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:55:40.081 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:55:40.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:55:40.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:55:40.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:55:40.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:55:40.248  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:55:40.248  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:55:40.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:55:40.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:55:40.251  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:55:40.254  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:55:40.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:55:40.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:55:40.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:55:40.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:55:40.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:55:40.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:55:40.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:55:40.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:55:40.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:55:40.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:55:40.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:da:fe:21:13:47:09:f7:e2:f8:7d:fc:82:16:5b:eb:48:c4:19:7a]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 04:56:16.182  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:56:16.183 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:56:16.185 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-18 04:56:16.186 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:56:16.186  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-18 04:56:16.187  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:56:16.187  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:56:16.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:56:16.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:56:16.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:56:16.194 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:56:16.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:56:16.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:56:16.196 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:56:16.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:56:16.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:56:16.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:56:16.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:56:16.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:56:16.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:56:16.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:56:16.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:56:16.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:56:16.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:56:16.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:56:16.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:56:16.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:56:16.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:56:16.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:56:16.338 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:56:16.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:b3:da:22:8d:11:61:d0:a1:5e:73:ce:44:59:6f:7e:ea:49:d3:58]
            modulus: c642a5b56693bdd7659b90bf6f9f692f67656cee916b1685f7851ff2678249f287492c2bb8dc330818df07f73e6a8f45dd679c48bd49e9e3fee74542e8e3d713432866701a31cf2adebbd4beb38e462e2e7f79447cf6c08bb098be1413a133077f33ed42fccfa6baaa66bba78868b4d425fbd08f418e177b97c0a82ba9debf827c1462ec0aab8351ef6be7274f0e1f1f2634c1df56de111a95c5333725d3110e787e2139a82ede0e9d5bb333fba3905493d72674d539b0713304afdeca4d764530e49fed54a6b7d49fdcbf4d8ce5fcafc10ec6e115a3b96e8ef82e2f70eea8d0b6c1b55527e64701e887ebd2a58193fc4ba7d298cc4b5026075c5d97a45c3cd1
    public exponent: 10001

] 
2022-06-18 04:59:42.084  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 04:59:42.087 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 04:59:42.090 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:59:42.091 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 04:59:42.092  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 04:59:42.092  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 04:59:42.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 04:59:42.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 04:59:42.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 04:59:42.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 04:59:42.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 04:59:42.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:59:42.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 04:59:42.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:59:42.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 04:59:42.311  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 04:59:42.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 04:59:42.312 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 04:59:42.314  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 04:59:42.316  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 04:59:42.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:59:42.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:59:42.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:59:42.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:59:42.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:59:42.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:59:42.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 04:59:42.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 04:59:42.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 04:59:42.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 04:59:42.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:c9:85:e8:eb:8d:df:6d:1e:fb:47:a6:4d:f3:eb:9d:7d:2e:39:55]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:04:14.121  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:04:14.124 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:04:14.127 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-18 05:04:14.128 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:04:14.129  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-18 05:04:14.130  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:04:14.130  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:04:14.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:04:14.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:04:14.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:04:14.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:04:14.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:04:14.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:04:14.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:04:14.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:04:14.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:04:14.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:04:14.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:04:14.302  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:04:14.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:04:14.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:14.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:14.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:14.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:14.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:14.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:14.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:14.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:14.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:14.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:04:14.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:47:52:16:74:25:b4:fe:57:93:1f:3e:7e:1e:dc:80:2c:c1:63:aa]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:04:32.447  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:04:32.448 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:04:32.450 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-18 05:04:32.450 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:04:32.451  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-18 05:04:32.451  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:04:32.452  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:04:32.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:04:32.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:04:32.453 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:04:32.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:04:32.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:04:32.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:04:32.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:04:32.610  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:04:32.611  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:04:32.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:04:32.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:04:32.614  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:04:32.614  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:04:32.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:32.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:32.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:32.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:32.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:32.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:32.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:32.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:32.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:32.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:04:32.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: c66d31571392485c07aec118f1f25753bbd7b93d4ce707393769580be2720ff58eb15d378866baf54f46ccf2cf6e5a7855ae4ded41281cb44fc1407daabf1bcdb57a93d19f038cefe1220169bce581bc36677a125302a88b78e594ae3b1094b4288032829dfa395b8c78cc4b8d8f5aed4915129eb4008324ebf8dcd64e833492545fa343ede36545b540b6aee2d2fd4c9cd6d46541fde8c36fc4ab4a8a4bfd2916590d5bd4d389ade42bbb16d87146d9ad9798fbe0b9fed3f7af719807fdeae58217b87402e8e83021bd4f3a13866eca70f83482452569aa13b92d7f1927f5a47f635d0f73d899096ce037bb1a5f3a49736dbc1fc827d79a4dc13427f89f030bc24df792fba3bd46a7d6a81709d7a44207603cd65ddc052d43c34812395e41938707c6a404bc4c5cd6872771727a63bed0936c847d51ca40bbca8c3fe854a13a053e3ca5213e1789c1a752bed9b40c6783987e161ce1da143ea4f70d07395afa1af8465832cd21cd6a2a65b68c0f97cf4c47202d098752e1c9213990b4be596f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:bf:18:5c:c2:77:08:00:e1:ec:4d:86:0f:2e:19:ef:92:1c:bf:50]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:04:36.034  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:04:36.035 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:04:36.037 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:04:36.038 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:04:36.038  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:04:36.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:04:36.040  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:04:36.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:04:36.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:04:36.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:04:36.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:04:36.048 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:04:36.048 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:04:36.049 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:04:36.164  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:04:36.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:04:36.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:04:36.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:04:36.167  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:04:36.167  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:04:36.167 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:36.168 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:36.168 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:36.169 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:36.169 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:36.169 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:36.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:04:36.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:04:36.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:04:36.172 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:04:36.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: c66d31571392485c07aec118f1f25753bbd7b93d4ce707393769580be2720ff58eb15d378866baf54f46ccf2cf6e5a7855ae4ded41281cb44fc1407daabf1bcdb57a93d19f038cefe1220169bce581bc36677a125302a88b78e594ae3b1094b4288032829dfa395b8c78cc4b8d8f5aed4915129eb4008324ebf8dcd64e833492545fa343ede36545b540b6aee2d2fd4c9cd6d46541fde8c36fc4ab4a8a4bfd2916590d5bd4d389ade42bbb16d87146d9ad9798fbe0b9fed3f7af719807fdeae58217b87402e8e83021bd4f3a13866eca70f83482452569aa13b92d7f1927f5a47f635d0f73d899096ce037bb1a5f3a49736dbc1fc827d79a4dc13427f89f030bc24df792fba3bd46a7d6a81709d7a44207603cd65ddc052d43c34812395e41938707c6a404bc4c5cd6872771727a63bed0936c847d51ca40bbca8c3fe854a13a053e3ca5213e1789c1a752bed9b40c6783987e161ce1da143ea4f70d07395afa1af8465832cd21cd6a2a65b68c0f97cf4c47202d098752e1c9213990b4be596f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:48:bf:e3:48:41:bb:c6:a1:79:33:7a:7a:41:c1:4c:72:7e:b4:bf]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:09:32.689  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:09:32.692 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:09:32.704 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:09:32.706 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:09:32.706  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:09:32.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:09:32.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:09:32.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:09:32.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:09:32.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:09:32.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:09:32.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:09:32.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:09:32.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:09:32.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:09:32.899  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:09:32.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:09:32.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:09:32.902  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:09:32.903  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:09:32.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:09:32.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:09:32.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:09:32.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:09:32.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:09:32.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:09:32.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:09:32.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:09:32.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:09:32.908 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:09:32.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:c1:cf:85:ec:20:67:fa:92:47:b1:41:e1:02:89:27:73:bc:57:de]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:14:00.887  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:14:00.891 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:14:00.893 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:14:00.895 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:14:00.895  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:14:00.896  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:14:00.897  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:14:00.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:14:00.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:14:00.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:14:00.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:14:00.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:14:00.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:14:00.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:14:01.102  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:14:01.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:14:01.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:14:01.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:14:01.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:14:01.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:14:01.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:14:01.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:14:01.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:14:01.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:14:01.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:14:01.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:14:01.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:14:01.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:14:01.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:14:01.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:14:01.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: c66d31571392485c07aec118f1f25753bbd7b93d4ce707393769580be2720ff58eb15d378866baf54f46ccf2cf6e5a7855ae4ded41281cb44fc1407daabf1bcdb57a93d19f038cefe1220169bce581bc36677a125302a88b78e594ae3b1094b4288032829dfa395b8c78cc4b8d8f5aed4915129eb4008324ebf8dcd64e833492545fa343ede36545b540b6aee2d2fd4c9cd6d46541fde8c36fc4ab4a8a4bfd2916590d5bd4d389ade42bbb16d87146d9ad9798fbe0b9fed3f7af719807fdeae58217b87402e8e83021bd4f3a13866eca70f83482452569aa13b92d7f1927f5a47f635d0f73d899096ce037bb1a5f3a49736dbc1fc827d79a4dc13427f89f030bc24df792fba3bd46a7d6a81709d7a44207603cd65ddc052d43c34812395e41938707c6a404bc4c5cd6872771727a63bed0936c847d51ca40bbca8c3fe854a13a053e3ca5213e1789c1a752bed9b40c6783987e161ce1da143ea4f70d07395afa1af8465832cd21cd6a2a65b68c0f97cf4c47202d098752e1c9213990b4be596f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:fd:cc:fd:e2:33:c4:e4:8a:c9:5d:a7:b9:94:34:dd:20:35:d9:4a]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:20:30.606  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:20:30.609 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:20:30.612 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:20:30.617 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:20:30.618  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:20:30.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:20:30.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:20:30.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:20:30.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:20:30.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:20:30.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:20:30.628 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:20:30.629 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:20:30.629 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:20:30.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:20:30.802  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:20:30.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:20:30.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:20:30.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:20:30.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:20:30.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:20:30.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:20:30.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:20:30.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:20:30.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:20:30.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:20:30.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:20:30.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:20:30.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:20:30.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:20:30.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:a6:af:55:03:45:90:98:c5:e4:2f:0c:5d:65:e7:eb:e8:ff:9a:cf]
            modulus: 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
    public exponent: 10001

] 
2022-06-18 05:25:33.738  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-18 05:25:33.741 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-18 05:25:33.743 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:25:33.744 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-18 05:25:33.744  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-18 05:25:33.745  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-18 05:25:33.746  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-18 05:25:33.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-18 05:25:33.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-18 05:25:33.748 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-18 05:25:33.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-18 05:25:33.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:25:33.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-18 05:25:33.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:25:33.956  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-18 05:25:33.957  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-18 05:25:33.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-18 05:25:33.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-18 05:25:33.959  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-18 05:25:33.960  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-18 05:25:33.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:25:33.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:25:33.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:25:33.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:25:33.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:25:33.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:25:33.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-18 05:25:33.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-18 05:25:33.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-18 05:25:33.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-18 05:25:33.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 279518130035605911381386149147675306679904189628
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 18 03:12:48 UTC 2022
           Final Date: Thu Jun 17 03:12:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:93:39:e7:64:e9:b5:36:19:be:d5:21:a6:c5:d6:69:6f:90:a9:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2000091a6f2d98168045208a7ccf5916acd53a0e
                       517cc2b52776233a9454bb2d4d0f8fe57c78cd65
                       104d7a9bbc83559875ec81f5aef9c71029f9d85d
                       21970267a6a2ec5316892fbb9b24e72238b318b2
                       a49e14b01a3b2bd2f3ca1a76064ffdbcfc7e20f3
                       aaedcabeae92bfb41ad617fb7886b234b7de80db
                       d45624afc0dedfaa18ba1c0861ede707c5ffbdf3
                       59d901304372735d1c0bbf2dd923dd0f376cfacb
                       1002692ba7891aed3763fc4bf945921f82eed684
                       9da283ddcda4e84d15af49eaaa99286b35a4b6db
                       4d1a363cca5fe066ed60faf335410661959b1762
                       32d4c8cf514b0115a5ce2aef758247be74ac5e13
                       084deee0df3691ac0c691773b337809822ac23f0
                       4f7c76af785fb9f2c2ed50bca665eea8f30132ab
                       e0984cd78e50eca3bd48a07c7763fb4b3106b7b1
                       d391762ca9eae3b3351f1a0d366d12c0a02cc6eb
                       f6196cbd3b75195252b0ead529f863ff16f96024
                       c28fbdc9f70026d46792197c7b7300771e1fa0ca
                       7be24027261a81411d954ab74d060a30569160dc
                       f4f169c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:90:38:2d:2e:c3:12:cf:01:aa:6f:c9:53:1c:c1:ff:13:9a:6a:83]
            modulus: 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
    public exponent: 10001

]