Results

By type

          2022-07-04 03:21:08,663 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-04 03:21:09,488 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-04 03:21:10.235  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 04, 2022 3:21:11 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 04, 2022 3:21:11 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 04, 2022 3:21:11 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 04, 2022 3:21:12 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-04 03:21:12.521 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-04 03:21:12.800  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-04 03:21:12.962  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-04 03:21:13.620 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-04 03:21:13.624 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-07-04 03:21:13.626 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-04 03:21:13.630 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-04 03:21:13.671 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-04 03:21:13.674 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-04 03:21:13.791 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-04 03:21:14.317 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 04, 2022 3:21:14 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-04 03:21:15.238  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.323 seconds (JVM running for 9.041)
Jul 04, 2022 3:21:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-04 03:22:11.674  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 03:22:11.682 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 03:22:11.721 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-04 03:22:11.724 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 03:22:11.739  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-04 03:22:11.741  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 03:22:11.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 03:22:11.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 03:22:11.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 03:22:11.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 03:22:11.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 03:22:11.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 03:22:11.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 03:22:11.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 03:22:11.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 03:22:11.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 03:22:12.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 03:22:12.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 03:22:12.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 03:22:12.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 03:22:12.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 03:22:12.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 03:22:12.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 03:22:12.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 03:22:12.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 03:22:12.360 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 03:22:12.361 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 03:22:12.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 03:22:12.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 03:22:12.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 03:22:12.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 03:22:12.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 03:22:12.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:11:bc:0d:9f:b7:25:aa:de:41:1f:1b:18:ee:52:d1:c4:01:74:16]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 04:50:52.109  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 04:50:52.112 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 04:50:52.115 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 04:50:52.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 04:50:52.117  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 04:50:52.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 04:50:52.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 04:50:52.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 04:50:52.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 04:50:52.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 04:50:52.132 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 04:50:52.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:50:52.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:50:52.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:50:52.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 04:50:52.321  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 04:50:52.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 04:50:52.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:50:52.325  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 04:50:52.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 04:50:52.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:50:52.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:50:52.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:50:52.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:50:52.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:50:52.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:50:52.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:50:52.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:50:52.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:50:52.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 04:50:52.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:f3:e3:f9:32:2c:88:04:3b:ed:c2:10:a2:7b:4b:19:dd:cb:bf:0c]
            modulus: a7963cc43e3004b439c8b52a6316dfbab4449b95133e0ea472acb359ca9ee9864611e938af0f894fa2758c3347fb31edbe8ff1c1a99c1e330f8df3683b1464615fbf533670c1c9a69e69b10ddf38114bade430d6ae32f964be98ca596a993795cbde0dc01a953458870c40d59ee5eb9915abca995ae21ac54f80ee9eba4b3139109044c08899c816bcf8144c4e1868a433f2a8f0486d1d35a083d92e8a9f2e7ad12b65c5c08076d7ae1d29bc366758b717338bdbc3f7bb8f93cc0193b676f2283987c6ee3b7f8b2de77336e9a8b0136133fd3d053eff46b7113feb1b71e9854705647e48d12e61225e84b5714ac9dafa400e6c156c6822ef57c68251738e3e77
    public exponent: 10001

] 
2022-07-04 04:52:40.074  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 04:52:40.076 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 04:52:40.079 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-04 04:52:40.081 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 04:52:40.081  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-04 04:52:40.082  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 04:52:40.083  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 04:52:40.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 04:52:40.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 04:52:40.085 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 04:52:40.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 04:52:40.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:52:40.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:52:40.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:52:40.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 04:52:40.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 04:52:40.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 04:52:40.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:52:40.223  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 04:52:40.223  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 04:52:40.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:52:40.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:52:40.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:52:40.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:52:40.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:52:40.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:52:40.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:52:40.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:52:40.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:52:40.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 04:52:40.237 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: b9e9f4ff9e6e150aedf6173f7ee5404b954b626d3baa35ab40d99bccf45ef2b2181225c1773bd829071043e9b7e3ab155d8c646b27c2f389d3d94417343586b89cad15ca222b69c239ed56cd8c6caccc807ce605b8476af5f35b72602c909228b28d6607909569e41e005efea8c3ec47ce3a7a5a909e97b223df20cddc4a37f6b2516afb1c41b6f5dcd4f5bf39e41b0624b69fed3b10464e919f3ed23791219866b90c5dbf05bc48737f36b5e7ffd5f7b530aec53e0a5a0777ad49547ac5548b7e9d518c040f0750dd2c30b5280a3f4fe689079cba2906ec3c7b110ac9500c41efce67a4c53a486763de7e4a17aadc44dd780a3e1ef4d4e98b547e215a1d63e224e66db929c87e2fa92d0802f8edacf85d0255e439577c541e2fae7af499a2fb7bb1b5f1a392f7472d4d0743daeac22a795d36c1a265573310067b137415ae2e2eee29ab35f0a5621bba908f89095479f918d55e7caf0ba5b0e4b69e6654787bb9ce3800cf5c9d6a93aba40ea42ff95cfd8760226f8290971b2baab7d6078863
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:3d:04:08:28:f0:bd:48:92:30:d6:6a:bb:59:95:c5:36:92:c7:5d]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 04:53:52.040  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 04:53:52.041 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 04:53:52.043 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-04 04:53:52.044 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 04:53:52.051  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-04 04:53:52.053  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 04:53:52.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 04:53:52.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 04:53:52.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 04:53:52.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 04:53:52.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 04:53:52.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:53:52.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:53:52.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:53:52.214  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 04:53:52.215  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 04:53:52.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 04:53:52.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:53:52.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 04:53:52.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 04:53:52.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:53:52.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:53:52.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:53:52.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:53:52.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:53:52.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:53:52.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:53:52.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:53:52.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:53:52.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 04:53:52.237 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:7b:44:54:c0:50:61:4a:67:d7:91:35:a0:2c:84:bc:b4:a8:d0:ce]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 04:56:31.539  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 04:56:31.540 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 04:56:31.542 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 04:56:31.543 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 04:56:31.544  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 04:56:31.545  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 04:56:31.545  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 04:56:31.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 04:56:31.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 04:56:31.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 04:56:31.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 04:56:31.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:56:31.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:56:31.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:56:31.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 04:56:31.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 04:56:31.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 04:56:31.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:56:31.755  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 04:56:31.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 04:56:31.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:56:31.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:56:31.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:56:31.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:56:31.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:56:31.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:56:31.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:56:31.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:56:31.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:56:31.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 04:56:31.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: b9e9f4ff9e6e150aedf6173f7ee5404b954b626d3baa35ab40d99bccf45ef2b2181225c1773bd829071043e9b7e3ab155d8c646b27c2f389d3d94417343586b89cad15ca222b69c239ed56cd8c6caccc807ce605b8476af5f35b72602c909228b28d6607909569e41e005efea8c3ec47ce3a7a5a909e97b223df20cddc4a37f6b2516afb1c41b6f5dcd4f5bf39e41b0624b69fed3b10464e919f3ed23791219866b90c5dbf05bc48737f36b5e7ffd5f7b530aec53e0a5a0777ad49547ac5548b7e9d518c040f0750dd2c30b5280a3f4fe689079cba2906ec3c7b110ac9500c41efce67a4c53a486763de7e4a17aadc44dd780a3e1ef4d4e98b547e215a1d63e224e66db929c87e2fa92d0802f8edacf85d0255e439577c541e2fae7af499a2fb7bb1b5f1a392f7472d4d0743daeac22a795d36c1a265573310067b137415ae2e2eee29ab35f0a5621bba908f89095479f918d55e7caf0ba5b0e4b69e6654787bb9ce3800cf5c9d6a93aba40ea42ff95cfd8760226f8290971b2baab7d6078863
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:2b:e5:43:16:95:37:97:3b:1b:0f:dd:97:93:1b:8b:cc:34:9c:e3]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 04:59:43.680  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 04:59:43.681 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 04:59:43.684 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 04:59:43.684 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 04:59:43.685  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 04:59:43.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 04:59:43.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 04:59:43.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 04:59:43.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 04:59:43.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 04:59:43.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 04:59:43.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:59:43.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 04:59:43.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:59:43.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 04:59:43.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 04:59:43.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 04:59:43.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 04:59:43.871  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 04:59:43.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 04:59:43.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:59:43.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:59:43.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:59:43.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:59:43.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:59:43.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:59:43.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 04:59:43.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 04:59:43.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 04:59:43.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 04:59:43.879 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:c5:92:33:8f:19:3b:21:1d:de:ff:a6:e0:c8:6e:89:44:72:65:6d]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:03:57.899  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:03:57.901 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:03:57.903 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:03:57.904 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:03:57.905  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:03:57.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:03:57.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:03:57.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:03:57.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:03:57.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:03:57.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:03:57.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:03:57.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:03:57.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:03:58.178  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:03:58.179  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:03:58.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:03:58.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:03:58.181  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:03:58.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:03:58.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:03:58.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:03:58.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:03:58.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:03:58.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:03:58.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:03:58.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:03:58.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:03:58.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:03:58.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:03:58.192 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:00:a6:4b:f6:87:f1:61:04:da:67:c7:b7:98:c6:a5:88:76:42:2b]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:05:38.330  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:05:38.332 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:05:38.333 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:05:38.334 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:05:38.334  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:05:38.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:05:38.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:05:38.335 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:05:38.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:05:38.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:05:38.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:05:38.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:05:38.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:05:38.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:05:38.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:05:38.514  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:05:38.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:05:38.515 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:05:38.516  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:05:38.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:05:38.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:05:38.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:05:38.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:05:38.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:05:38.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:05:38.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:05:38.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:05:38.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:05:38.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:05:38.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:05:38.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:b0:5e:d5:05:f3:6d:dc:55:f5:87:41:3e:8f:36:24:62:0a:45:c0]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:08:47.926  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:08:47.927 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:08:47.929 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:08:47.929 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:08:47.930  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:08:47.930  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:08:47.930  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:08:47.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:08:47.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:08:47.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:08:47.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:08:47.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:08:47.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:08:47.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:08:48.099  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:08:48.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:08:48.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:08:48.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:08:48.102  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:08:48.103  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:08:48.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:08:48.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:08:48.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:08:48.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:08:48.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:08:48.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:08:48.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:08:48.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:08:48.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:08:48.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:08:48.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:5c:5b:2e:b5:01:34:e7:ab:1a:ee:78:09:4f:db:a2:d8:09:d9:c1]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:12:14.960  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:12:14.961 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:12:14.963 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-04 05:12:14.963 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:12:14.964  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-04 05:12:14.964  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:12:14.964  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:12:14.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:12:14.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:12:14.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:12:14.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:12:14.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:12:14.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:12:14.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:12:15.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:12:15.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:12:15.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:12:15.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:12:15.101  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:12:15.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:12:15.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:12:15.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:12:15.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:12:15.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:12:15.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:12:15.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:12:15.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:12:15.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:12:15.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:12:15.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:12:15.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:b4:a1:b5:1b:96:0e:52:a7:42:04:af:fe:41:2d:81:3b:d1:23:9f]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:13:20.719  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:13:20.721 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:13:20.723 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:13:20.724 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:13:20.724  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 05:13:20.725  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:13:20.725  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:13:20.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:13:20.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:13:20.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:13:20.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:13:20.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:13:20.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:13:20.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:13:20.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:13:20.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:13:20.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:13:20.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:13:20.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:13:20.899  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:13:20.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:13:20.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:13:20.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:13:20.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:13:20.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:13:20.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:13:20.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:13:20.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:13:20.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:13:20.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:13:20.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:45:82:b6:a4:ff:45:13:f3:ab:ee:a8:ac:64:55:db:c3:99:7e:06]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:16:59.785  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:16:59.786 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:16:59.788 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-04 05:16:59.789 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:16:59.789  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-04 05:16:59.790  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:16:59.790  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:16:59.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:16:59.791 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:16:59.791 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:16:59.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:16:59.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:16:59.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:16:59.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:16:59.998  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:16:59.998  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:16:59.999 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:16:59.999 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:17:00.000  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:17:00.000  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:17:00.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:17:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:17:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:17:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:17:00.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:17:00.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:17:00.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:17:00.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:17:00.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:17:00.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:17:00.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:88:b2:9e:87:70:84:9c:ee:65:c7:3f:2a:5f:2a:9c:33:a5:86:a5]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 05:17:13.054  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:17:13.056 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:17:13.058 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-04 05:17:13.058 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:17:13.058  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-04 05:17:13.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:17:13.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:17:13.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:17:13.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:17:13.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:17:13.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:17:13.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:17:13.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:17:13.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:17:13.250  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:17:13.250  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:17:13.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:17:13.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:17:13.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:17:13.253  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:17:13.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:17:13.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:17:13.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:17:13.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:17:13.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:17:13.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:17:13.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:17:13.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:17:13.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:17:13.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:17:13.259 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 336344548175902686698176278389656643273672751417
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 03:18:40 UTC 2022
           Final Date: Sat Jul 03 03:18:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671
                       907cdb4d2e4e7610c3293e2c1da53286157b19dc
                       a919c44f7f288ce028c9f74dd3cebd99ae3991d0
                       29114fce5ef1a63c4fe9e114411f32c339823aa0
                       42077c3b8889df7305c8af623c7c7e2214338929
                       1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad
                       01501360b1b510cd3bed22ad0d5ed31bd7ef4282
                       3e02851f791d365b31a31dafcee22f659a0a6403
                       38644d872a64e0ea632494f816408fb9482ba952
                       ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd
                       16185a2477e59040d163b191ca176f3ba917ff23
                       abb8e167cd4ff173365d671a592af1d685e5010c
                       43c8efd65bba96baee652b72f5d4181c3b895b29
                       be603487ab8de8658500910cba261378d66562ff
                       df1c20d84ac6dd4f71f4c87e951ffcbff01ea863
                       78f4f4a6493a0154ce7932db75c923f7a161588c
                       1f90670feaa18f78e0d53be16bdc107dd1c330e4
                       7be3088df9603b813209f13cb2f0533225a3c16d
                       20b9d92d4ebb46cf538fa21123bb7c57d425728a
                       cf7d2ea5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:57:3c:49:99:5e:4c:7a:44:39:ef:71:fd:b4:dd:91:e3:9c:83:d6]
            modulus: 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
    public exponent: 10001

]