Results

By type

          2022-06-28 03:14:19,319 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-28 03:14:20,264 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-28 03:14:21.091  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 28, 2022 3:14:23 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 28, 2022 3:14:23 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 28, 2022 3:14:23 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 28, 2022 3:14:23 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-28 03:14:23.731 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-28 03:14:24.042  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-28 03:14:24.222  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-28 03:14:24.967 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-28 03:14:24.970 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-28 03:14:24.971 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-28 03:14:24.975 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-28 03:14:25.016 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-28 03:14:25.019 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-28 03:14:25.158 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-28 03:14:25.724 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 28, 2022 3:14:26 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-28 03:14:26.649  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.143 seconds (JVM running for 10.054)
Jun 28, 2022 3:14:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-28 03:15:00.759  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 03:15:00.777 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 03:15:00.819 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-28 03:15:00.823 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 03:15:00.845  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-28 03:15:00.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 03:15:00.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 03:15:00.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 03:15:00.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 03:15:00.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 03:15:00.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 03:15:00.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 03:15:00.922 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 03:15:00.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 03:15:00.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 03:15:00.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 03:15:01.542  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 03:15:01.545  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 03:15:01.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 03:15:01.547 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 03:15:01.557  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 03:15:01.558  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 03:15:01.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 03:15:01.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 03:15:01.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 03:15:01.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 03:15:01.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 03:15:01.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 03:15:01.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 03:15:01.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 03:15:01.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 03:15:01.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 03:15:01.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:af:72:70:d9:fe:4e:bd:fa:21:7f:42:47:2c:25:7a:36:6e:f1:de]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:36:04.573  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:36:04.577 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:36:04.582 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:36:04.587 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:36:04.589  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:36:04.595  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:36:04.596  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:36:04.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:36:04.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:36:04.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:36:04.623 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:36:04.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:36:04.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:36:04.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:36:04.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:36:04.871  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:36:04.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:36:04.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:36:04.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:36:04.878  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:36:04.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:36:04.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:36:04.880 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:36:04.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:36:04.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:36:04.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:36:04.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:36:04.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:36:04.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:36:04.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:36:04.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:4b:8f:00:89:54:f7:10:44:5f:73:0b:4f:1d:d3:3b:53:ce:e8:6e]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:38:53.503  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:38:53.505 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:38:53.507 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:38:53.507 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:38:53.512  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:38:53.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:38:53.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:38:53.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:38:53.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:38:53.515 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:38:53.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:38:53.530 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:38:53.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:38:53.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:38:53.677  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:38:53.678  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:38:53.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:38:53.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:38:53.682  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:38:53.682  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:38:53.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:38:53.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:38:53.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:38:53.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:38:53.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:38:53.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:38:53.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:38:53.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:38:53.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:38:53.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:38:53.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:1f:f8:a9:a7:a5:d3:af:6e:7d:28:c2:af:58:25:2c:15:07:8c:0f]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:40:11.238  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:40:11.241 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:40:11.245 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-28 04:40:11.247 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:40:11.247  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-28 04:40:11.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:40:11.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:40:11.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:40:11.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:40:11.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:40:11.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:40:11.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:40:11.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:40:11.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:40:11.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:40:11.401  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:40:11.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:40:11.402 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:40:11.405  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:40:11.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:40:11.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:40:11.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:40:11.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:40:11.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:40:11.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:40:11.410 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:40:11.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:40:11.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:40:11.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:40:11.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:40:11.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:f1:4c:b5:ba:69:94:af:94:04:65:15:56:62:79:1c:aa:66:f3:0e]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:41:27.123  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:41:27.125 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:41:27.127 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-28 04:41:27.127 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:41:27.128  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-28 04:41:27.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:41:27.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:41:27.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:41:27.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:41:27.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:41:27.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:41:27.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:41:27.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:41:27.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:41:27.270  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:41:27.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:41:27.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:41:27.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:41:27.278  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:41:27.278  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:41:27.279 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:41:27.279 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:41:27.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:41:27.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:41:27.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:41:27.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:41:27.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:41:27.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:41:27.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:41:27.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:41:27.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: b942da8ddf0aa84621798e71456ffb00790b2e5a3778fe4051aa9f396998de8c17257b55926bec17b5ce176e8659ac5b63e486adc4d6349891a10a9db44928d3cd58178d8355d5304b78a963f217c07330eb5d61c73fb268ecb13c046d7d371732bc10390e2383cff38ac121f0bf208b35c413909aec94b2bfd2cc26f8af9a44cff9dc30700e4967471756f5d719328d6b73e48d293740d0df2c9725b0270a3414556b6dc8cca4b424ab0b00769aa6ecc6072e241b616f62dcafa8464c80fa507e596be83ad2b70bb0cddb5e562092e4f1ad4acc3dfa11fa168b10d4159f15c191c1819b5dc4d0f7a3ef33e57b75c057a93f064ef8eca4befad705040b10769b447458ceb63f669e0f0987d6129840934d44826978205706e7271423d7a74eaa1bee7a1dc729c0fd9eed48faa0d65fdc0d6f4063c8f29a5658391d8199bb2cf2a234a043019b3669d6e8f26bca7c300f7d44970981333d84b576bde46616fdc7a40602f29e9eb6b13953b2755d03b31b2ae5c93a1ce85891ca890fc6b1c09501
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:f7:b1:e4:2f:70:5e:d4:7b:65:77:3c:d9:02:60:60:c5:bc:01:ca]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:43:50.187  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:43:50.188 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:43:50.190 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:43:50.191 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:43:50.191  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:43:50.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:43:50.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:43:50.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:43:50.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:43:50.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:43:50.199 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:43:50.200 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:43:50.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:43:50.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:43:50.363  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:43:50.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:43:50.364 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:43:50.365 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:43:50.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:43:50.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:43:50.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:43:50.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:43:50.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:43:50.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:43:50.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:43:50.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:43:50.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:43:50.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:43:50.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:43:50.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:43:50.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: b942da8ddf0aa84621798e71456ffb00790b2e5a3778fe4051aa9f396998de8c17257b55926bec17b5ce176e8659ac5b63e486adc4d6349891a10a9db44928d3cd58178d8355d5304b78a963f217c07330eb5d61c73fb268ecb13c046d7d371732bc10390e2383cff38ac121f0bf208b35c413909aec94b2bfd2cc26f8af9a44cff9dc30700e4967471756f5d719328d6b73e48d293740d0df2c9725b0270a3414556b6dc8cca4b424ab0b00769aa6ecc6072e241b616f62dcafa8464c80fa507e596be83ad2b70bb0cddb5e562092e4f1ad4acc3dfa11fa168b10d4159f15c191c1819b5dc4d0f7a3ef33e57b75c057a93f064ef8eca4befad705040b10769b447458ceb63f669e0f0987d6129840934d44826978205706e7271423d7a74eaa1bee7a1dc729c0fd9eed48faa0d65fdc0d6f4063c8f29a5658391d8199bb2cf2a234a043019b3669d6e8f26bca7c300f7d44970981333d84b576bde46616fdc7a40602f29e9eb6b13953b2755d03b31b2ae5c93a1ce85891ca890fc6b1c09501
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:9a:db:1f:d7:d0:3f:89:bc:bd:16:f1:95:cb:92:86:89:91:92:97]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:47:54.111  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:47:54.118 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:47:54.121 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:47:54.122 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:47:54.122  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:47:54.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:47:54.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:47:54.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:47:54.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:47:54.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:47:54.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:47:54.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:47:54.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:47:54.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:47:54.253  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:47:54.254  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:47:54.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:47:54.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:47:54.256  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:47:54.257  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:47:54.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:47:54.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:47:54.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:47:54.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:47:54.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:47:54.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:47:54.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:47:54.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:47:54.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:47:54.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:47:54.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:b0:fd:bd:bc:24:67:6a:d9:ba:b3:a1:8d:86:d8:54:32:e7:fa:86]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:51:10.930  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:51:10.934 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:51:10.937 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-28 04:51:10.938 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:51:10.938  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-28 04:51:10.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:51:10.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:51:10.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:51:10.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:51:10.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:51:10.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:51:10.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:51:10.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:51:10.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:51:11.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:51:11.152  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:51:11.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:51:11.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:51:11.155  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:51:11.156  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:51:11.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:51:11.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:51:11.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:51:11.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:51:11.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:51:11.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:51:11.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:51:11.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:51:11.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:51:11.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:51:11.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:7a:f9:d4:ab:0d:7b:f8:da:d7:ce:1c:9e:17:02:c2:c9:9d:70:1c]
            modulus: c81a7d00ff9da213b5802cba963975edc761cf93b5ce5eb549d21deb16c9c584bf7043714d539f66bc162b0ec9a74488cf07722cf92146e99e171f4055f3c2df5358368522dfc214d479c6b6cfc049583747247990490a09a152396724eb2cd76cc44d921e865d9ad471e88775a0ee6c1d41649bd79ffd8693a3ae7e05a6c3512cc46ea3ea955aa7522951cdac5ce259f2e9debe3089d753e7906d1c53022e312446d351d4f5265e15a7b36bd7682ebcb52f9d5d1c025f3aa0f6cebf748e7ffa30b80f27e046d6766fc91efd8ac0f1971e140aff432bab44350877771f31c527265197b24588fb226833dd7c97b56453a2ca40bd886c602f35c7dfa54ba2cb07
    public exponent: 10001

] 
2022-06-28 04:52:05.197  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:52:05.199 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:52:05.200 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:52:05.201 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:52:05.201  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:52:05.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:52:05.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:52:05.202 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:52:05.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:52:05.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:52:05.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:52:05.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:52:05.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:52:05.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:52:05.431  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:52:05.432  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:52:05.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:52:05.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:52:05.435  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:52:05.436  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:52:05.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:52:05.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:52:05.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:52:05.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:52:05.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:52:05.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:52:05.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:52:05.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:52:05.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:52:05.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:52:05.448 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: b942da8ddf0aa84621798e71456ffb00790b2e5a3778fe4051aa9f396998de8c17257b55926bec17b5ce176e8659ac5b63e486adc4d6349891a10a9db44928d3cd58178d8355d5304b78a963f217c07330eb5d61c73fb268ecb13c046d7d371732bc10390e2383cff38ac121f0bf208b35c413909aec94b2bfd2cc26f8af9a44cff9dc30700e4967471756f5d719328d6b73e48d293740d0df2c9725b0270a3414556b6dc8cca4b424ab0b00769aa6ecc6072e241b616f62dcafa8464c80fa507e596be83ad2b70bb0cddb5e562092e4f1ad4acc3dfa11fa168b10d4159f15c191c1819b5dc4d0f7a3ef33e57b75c057a93f064ef8eca4befad705040b10769b447458ceb63f669e0f0987d6129840934d44826978205706e7271423d7a74eaa1bee7a1dc729c0fd9eed48faa0d65fdc0d6f4063c8f29a5658391d8199bb2cf2a234a043019b3669d6e8f26bca7c300f7d44970981333d84b576bde46616fdc7a40602f29e9eb6b13953b2755d03b31b2ae5c93a1ce85891ca890fc6b1c09501
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:a0:2e:ed:d0:53:9b:3b:2a:6c:86:ed:ff:93:28:25:83:92:18:7d]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:55:54.547  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:55:54.549 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:55:54.550 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:55:54.551 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:55:54.552  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-28 04:55:54.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:55:54.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:55:54.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:55:54.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:55:54.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:55:54.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:55:54.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:55:54.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:55:54.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:55:54.703  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:55:54.704  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:55:54.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:55:54.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:55:54.709  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:55:54.709  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:55:54.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:55:54.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:55:54.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:55:54.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:55:54.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:55:54.714 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:55:54.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:55:54.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:55:54.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:55:54.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:55:54.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:b4:29:0a:e5:a5:ae:cd:dd:ea:b8:7d:62:66:29:e2:ed:6f:ac:cb]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:56:01.216  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:56:01.217 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:56:01.219 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-28 04:56:01.220 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:56:01.220  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-28 04:56:01.221  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:56:01.222  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:56:01.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:56:01.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:56:01.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:56:01.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:56:01.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:56:01.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:56:01.230 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:56:01.381  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:56:01.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:56:01.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:56:01.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:56:01.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:56:01.387  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:56:01.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:56:01.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:56:01.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:56:01.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:56:01.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:56:01.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:56:01.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:56:01.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:56:01.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:56:01.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:56:01.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:04:34:01:7a:fd:2a:a3:0b:47:64:c2:41:0c:a5:1d:19:fc:6c:5d]
            modulus: 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
    public exponent: 10001

] 
2022-06-28 04:56:22.001  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-28 04:56:22.002 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-28 04:56:22.003 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-28 04:56:22.004 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-28 04:56:22.004  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-28 04:56:22.005  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-28 04:56:22.005  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-28 04:56:22.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-28 04:56:22.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-28 04:56:22.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-28 04:56:22.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-28 04:56:22.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:56:22.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-28 04:56:22.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:56:22.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-28 04:56:22.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-28 04:56:22.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-28 04:56:22.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-28 04:56:22.158  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-28 04:56:22.158  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-28 04:56:22.159 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:56:22.159 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:56:22.159 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:56:22.160 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:56:22.160 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:56:22.160 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:56:22.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-28 04:56:22.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-28 04:56:22.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-28 04:56:22.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-28 04:56:22.166 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155377784832299913439479648817215708643482985662
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 28 03:11:50 UTC 2022
           Final Date: Sun Jun 27 03:11:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:3d:1a:8e:87:6c:92:c1:75:9c:9d:ff:0d:e1:c8:a1:16:46:37:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 90352af8408d5e8a3f9cecfc40f4eaa611aeeea5
                       5ee1ee365e0741381f96db7289058e746725a6f4
                       7d5166f355c05cc2a5bf2bd761c24fa9fc3596b2
                       70cd12cd66b925e42e05aeac25be29698a2cce7d
                       b4733599318d16d4a3b0a580b6a4d6d041d359ed
                       9a648df19518c856fc31a5ad102f557ad59d20ea
                       800558e80d01d07906635dcaeb0965a19933b489
                       2a862293ceba0c3099de4fc32afb9e9b7aecc886
                       9d785656be97c052b8437a112fca592385dee18f
                       50905075342d61c04b30d05665daf7f7ebca4229
                       af7581cd2cf972b037bcf0ec19667e7a7eba2ba0
                       51169e3c22c7f8d41cfd0d560231a7442e0b7db3
                       77a2bc8380156a333ed3a579bbad9ca4382c5f4e
                       f4e511241312cd08714cdf648b49733b3e9e06e7
                       1a294a7a8030ca857f47c073f15789badbd7239f
                       e70169e534e2b82cf0532c58f84207f51d4ffab3
                       bc0f0360419b2e84f356f4bda84024bd3bfbd686
                       c8c45703388a187c736e32438235113e88345c9c
                       72908e808d1a652d9894bf7d1821865c852bc202
                       9d26af61
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:f2:af:e3:4f:b8:9d:42:69:60:e0:d8:cb:98:a1:05:dd:19:59:ad]
            modulus: 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
    public exponent: 10001

]