Results

By type

          2022-08-22 03:03:53,092 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-22 03:03:55,354 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-22 03:03:57.076  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 22, 2022 3:04:02 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 22, 2022 3:04:02 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 22, 2022 3:04:02 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 22, 2022 3:04:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-22 03:04:03.844 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-22 03:04:04.478  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-22 03:04:04.824  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-22 03:04:06.718 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-22 03:04:06.727 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-08-22 03:04:06.730 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-22 03:04:06.739 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-22 03:04:06.829 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-08-22 03:04:06.836 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-08-22 03:04:07.139 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-22 03:04:08.743 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 22, 2022 3:04:10 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-22 03:04:11.033  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 20.278 seconds (JVM running for 26.739)
Aug 22, 2022 3:04:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-22 03:04:53.879  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 03:04:53.894 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 03:04:53.976 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-22 03:04:53.986 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 03:04:54.043  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-22 03:04:54.048  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 03:04:54.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 03:04:54.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 03:04:54.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 03:04:54.059 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 03:04:54.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 03:04:54.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 03:04:54.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 03:04:54.175 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 03:04:54.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 03:04:54.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 03:04:55.170  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 03:04:55.181  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 03:04:55.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 03:04:55.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 03:04:55.208  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 03:04:55.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 03:04:55.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 03:04:55.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 03:04:55.214 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 03:04:55.235 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 03:04:55.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 03:04:55.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 03:04:55.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 03:04:55.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 03:04:55.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 03:04:55.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 03:04:55.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: c562b89f4e63a7bba440f4749de8ed007538c1188b56550554528878f8130e55c80cf225f5661bc82353cc614f9bb9864ef8eef96872e838fb970b7a99bb220b878d93933714a3ba2c050de574ec7764040dabc252b92ba5a4ee5e7a48cbbb09a9ead535179bf3ab2d3bcbcd668ed031f293088edd80ef402853561f680a0e582a456608475898d3bc697ec00232b28efa1ea95212f1049d3704ad3c73dae4fbecc0959343a41f344be83582c48a6a54a5894e94ef09214a027a6c7c581f23047f749ea41e188a1d5ddb253710ae653ed57eb0aff3e597c3293de4303165f1a6f03d649597f9c9a6c3b0e040966502d7d945f1bba28ac6827229ff9871f21213002a7bf7c325b7f922523a8be0335fec1eb8c8c31c43ec91a576bf7a92092c9f6a320309fd493aa2afb2e2699868f12483646e1063d723e45ebc9d985e19623a418d3f5000f7cf190855fcf5716ea262b334e3eb23029d9c6605800c5ebdfc794366573b9debec003c71b97a11b0dff7306f9b539ffb03349de3eb3a0bcd9c49
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:51:3d:d5:dd:4e:e9:a6:05:62:b8:79:e0:4c:74:a3:c6:96:7b:3c]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:09:16.557  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:09:16.562 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:09:16.567 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:09:16.569 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:09:16.570  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:09:16.571  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:09:16.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:09:16.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:09:16.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:09:16.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:09:16.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:09:16.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:09:16.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:09:16.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:09:16.848  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:09:16.850  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:09:16.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:09:16.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:09:16.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:09:16.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:09:16.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:09:16.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:09:16.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:09:16.861 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:09:16.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:09:16.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:09:16.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:09:16.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:09:16.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:09:16.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:09:16.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:cc:16:88:d9:af:2b:81:d6:f2:c9:b1:0b:08:bf:0d:7e:f1:f9:a6]
            modulus: bf8a465195ef7d7b44e25748c4375288070c120fdd7212519fb878292f05a4d43e18b7af70202296f70e0fcdde16494db353935d4fb5ff58623670140b34fdddfad44b46abc3dcc4b7d5b4cb8f8ae0362ae5cbb3eb92cd31a17b65049b3e627a780bff27bb577c81cb3b653e8a8e554d8498aa46b1303c8f8909e337019c715d1e0ba99adf8f359119ad7db62d3bb29017c54712c7bee773ff48e5267e1d56f18f693a5bb1acfffadaa1bad4f6440930157dc6bfdc12bd39822fadc31271f7165126605f085ee7e2aa27b02772b1d1e80a42fc6e7bd30aa178ec39e2e2f916c89799e054f4406e8e7498a50dd9d81259545a23686ed237cf07469d30115e1a93
    public exponent: 10001

] 
2022-08-22 04:11:02.780  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:11:02.786 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:11:02.793 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-22 04:11:02.795 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:11:02.796  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-22 04:11:02.798  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:11:02.799  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:11:02.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:11:02.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:11:02.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:11:02.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:11:02.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:11:02.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:11:02.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:11:03.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:11:03.192  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:11:03.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:11:03.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:11:03.205  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:11:03.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:11:03.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:11:03.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:11:03.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:11:03.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:11:03.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:11:03.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:11:03.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:11:03.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:11:03.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:11:03.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:11:03.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: c562b89f4e63a7bba440f4749de8ed007538c1188b56550554528878f8130e55c80cf225f5661bc82353cc614f9bb9864ef8eef96872e838fb970b7a99bb220b878d93933714a3ba2c050de574ec7764040dabc252b92ba5a4ee5e7a48cbbb09a9ead535179bf3ab2d3bcbcd668ed031f293088edd80ef402853561f680a0e582a456608475898d3bc697ec00232b28efa1ea95212f1049d3704ad3c73dae4fbecc0959343a41f344be83582c48a6a54a5894e94ef09214a027a6c7c581f23047f749ea41e188a1d5ddb253710ae653ed57eb0aff3e597c3293de4303165f1a6f03d649597f9c9a6c3b0e040966502d7d945f1bba28ac6827229ff9871f21213002a7bf7c325b7f922523a8be0335fec1eb8c8c31c43ec91a576bf7a92092c9f6a320309fd493aa2afb2e2699868f12483646e1063d723e45ebc9d985e19623a418d3f5000f7cf190855fcf5716ea262b334e3eb23029d9c6605800c5ebdfc794366573b9debec003c71b97a11b0dff7306f9b539ffb03349de3eb3a0bcd9c49
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:95:65:fb:b2:25:75:b8:e7:f2:45:35:9e:6f:4a:26:9b:79:22:48]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:12:44.051  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:12:44.054 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:12:44.074 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-22 04:12:44.083 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:12:44.095  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-22 04:12:44.096  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:12:44.102  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:12:44.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:12:44.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:12:44.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:12:44.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:12:44.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:12:44.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:12:44.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:12:44.340  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:12:44.346  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:12:44.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:12:44.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:12:44.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:12:44.363  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:12:44.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:12:44.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:12:44.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:12:44.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:12:44.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:12:44.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:12:44.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:12:44.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:12:44.376 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:12:44.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:12:44.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:ab:d9:98:18:af:65:52:4c:0a:f2:ca:12:08:3f:72:b5:5d:27:8b]
            modulus: aff2aa3394a6bbed9c6aed439506a6101eef0101eac656a3643eec9128a48d8b4f06899b9805c83f4d7c2435d08bd816a0143b8ab4cd83e7696582148fa93d20e8cd2700f0a2ab607c757dae944ecc39d5d7bcff9f5929fffbbf8862c576cf47c4ada3ea66d83399e643b1d8f189c30f7cb306d240d43d58761123935670fe4844ea60e50d9c09b25f4f4e6d48fbc37370a12998f41d13c05590752ce9d77a9a921bb6b36833bdb6b1b1623facd5137b7affd5a3644a9e7885c3b2c13b8ca231e0e4fb002b5bf1a59a2b12206e270f2f9dd40ba320700fa607a41eea1af58205b1b663f23c809f85b5fd371f7ef0f29a7273a33a054b865686ec93fa0891484f
    public exponent: 10001

] 
2022-08-22 04:14:36.401  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:14:36.403 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:14:36.405 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:14:36.407 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:14:36.408  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:14:36.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:14:36.410  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:14:36.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:14:36.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:14:36.413 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:14:36.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:14:36.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:14:36.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:14:36.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:14:36.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:14:36.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:14:36.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:14:36.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:14:36.655  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:14:36.656  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:14:36.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:14:36.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:14:36.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:14:36.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:14:36.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:14:36.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:14:36.661 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:14:36.661 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:14:36.662 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:14:36.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:14:36.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: c562b89f4e63a7bba440f4749de8ed007538c1188b56550554528878f8130e55c80cf225f5661bc82353cc614f9bb9864ef8eef96872e838fb970b7a99bb220b878d93933714a3ba2c050de574ec7764040dabc252b92ba5a4ee5e7a48cbbb09a9ead535179bf3ab2d3bcbcd668ed031f293088edd80ef402853561f680a0e582a456608475898d3bc697ec00232b28efa1ea95212f1049d3704ad3c73dae4fbecc0959343a41f344be83582c48a6a54a5894e94ef09214a027a6c7c581f23047f749ea41e188a1d5ddb253710ae653ed57eb0aff3e597c3293de4303165f1a6f03d649597f9c9a6c3b0e040966502d7d945f1bba28ac6827229ff9871f21213002a7bf7c325b7f922523a8be0335fec1eb8c8c31c43ec91a576bf7a92092c9f6a320309fd493aa2afb2e2699868f12483646e1063d723e45ebc9d985e19623a418d3f5000f7cf190855fcf5716ea262b334e3eb23029d9c6605800c5ebdfc794366573b9debec003c71b97a11b0dff7306f9b539ffb03349de3eb3a0bcd9c49
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:3a:97:c2:e7:33:59:0c:c1:a7:2b:26:8b:60:c6:e6:7c:a0:6d:dc]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:18:02.349  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:18:02.352 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:18:02.377 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:18:02.379 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:18:02.388  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:18:02.389  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:18:02.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:18:02.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:18:02.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:18:02.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:18:02.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:18:02.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:18:02.412 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:18:02.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:18:02.683  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:18:02.685  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:18:02.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:18:02.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:18:02.691  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:18:02.692  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:18:02.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:18:02.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:18:02.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:18:02.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:18:02.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:18:02.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:18:02.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:18:02.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:18:02.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:18:02.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:18:02.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:26:a7:5c:f4:13:70:e5:e6:f2:0d:2d:20:65:70:86:77:6f:bc:23]
            modulus: df4bedc1999f8d8f721b2826dbd3f43614913c1ab9c8a50232dc3bc576b9f4b440738e4848eea8b65c4c4244422a557690179b2c4c441fb1a13f9b8f208a6353d2b39c9d5e01dddc58156870e65c56440ea4e76313eec77f3e469fad44b10167c1cf2f6f570117fcab40315b4a42972dfdda3665f5dffed041f6d5ac649db680bd40b261f6414b707fb6a5340a83abe99091c5d5f2a4cbbaacec4692450c9d06d61c041c64ba822868b5e0417608415707c1713c7b4151e68cfdfbadbab87850f3f10758ecf4c98d8807064207089212d75fd7741bbee856056bcf0fe847c0b214c2bc54bbe0e9109aff72bc3e4d95655123f4979073e3f3c83b43b0fe220ec7
    public exponent: 10001

] 
2022-08-22 04:20:23.416  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:20:23.418 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:20:23.423 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:20:23.424 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:20:23.425  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:20:23.426  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:20:23.426  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:20:23.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:20:23.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:20:23.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:20:23.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:20:23.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:20:23.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:20:23.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:20:23.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:20:23.603  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:20:23.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:20:23.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:20:23.611  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:20:23.612  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:20:23.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:20:23.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:20:23.616 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:20:23.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:20:23.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:20:23.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:20:23.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:20:23.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:20:23.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:20:23.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:20:23.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:e6:f4:dd:8f:12:8a:ed:5b:62:63:7b:b1:ba:c7:ef:3b:29:dd:f0]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:24:21.524  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:24:21.526 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:24:21.529 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:24:21.531 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:24:21.531  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-22 04:24:21.532  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:24:21.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:24:21.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:24:21.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:24:21.535 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:24:21.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:24:21.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:24:21.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:24:21.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:24:21.769  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:24:21.769  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:24:21.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:24:21.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:24:21.772  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:24:21.772  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:24:21.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:24:21.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:24:21.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:24:21.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:24:21.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:24:21.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:24:21.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:24:21.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:24:21.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:24:21.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:24:21.783 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:8b:3d:bf:33:cc:6b:09:d2:f5:ef:04:31:ab:5e:a0:3a:6e:29:11]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:28:14.907  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:28:14.910 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:28:14.914 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-22 04:28:14.916 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:28:14.917  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-22 04:28:14.918  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:28:14.919  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:28:14.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:28:14.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:28:14.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:28:14.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:28:14.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:28:14.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:28:14.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:28:15.155  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:28:15.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:28:15.158 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:28:15.158 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:28:15.161  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:28:15.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:28:15.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:28:15.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:28:15.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:28:15.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:28:15.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:28:15.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:28:15.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:28:15.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:28:15.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:28:15.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:28:15.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:0c:4e:92:f9:a3:b3:00:e7:a8:30:96:24:7b:79:6d:9c:6a:0a:71]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:33:15.240  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:33:15.249 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:33:15.254 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-22 04:33:15.256 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:33:15.257  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-22 04:33:15.258  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:33:15.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:33:15.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:33:15.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:33:15.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:33:15.285 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:33:15.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:33:15.289 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:33:15.289 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:33:15.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:33:15.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:33:15.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:33:15.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:33:15.590  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:33:15.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:33:15.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:33:15.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:33:15.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:33:15.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:33:15.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:33:15.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:33:15.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:33:15.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:33:15.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:33:15.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:33:15.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:23:f3:06:1b:b5:dc:f7:23:43:f2:1b:1d:5e:e4:6c:82:eb:b5:d7]
            modulus: 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
    public exponent: 10001

] 
2022-08-22 04:33:34.485  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-22 04:33:34.486 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-22 04:33:34.488 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-22 04:33:34.489 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-22 04:33:34.490  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-22 04:33:34.491  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-22 04:33:34.492  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-22 04:33:34.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-22 04:33:34.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-22 04:33:34.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-22 04:33:34.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-22 04:33:34.501 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:33:34.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-22 04:33:34.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:33:34.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-22 04:33:34.757  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-22 04:33:34.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-22 04:33:34.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-22 04:33:34.760  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-22 04:33:34.761  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-22 04:33:34.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:33:34.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:33:34.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:33:34.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:33:34.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:33:34.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:33:34.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-22 04:33:34.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-22 04:33:34.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-22 04:33:34.774 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-22 04:33:34.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 136556751551178387139864194916483716458096364407
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Aug 22 02:58:43 UTC 2022
           Final Date: Sat Aug 21 02:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:a5:9f:0d:44:63:89:68:5d:8e:c4:e0:5f:41:80:1a:4b:a8:74:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 852b961758c1d54d5194d89e8b718301f2b9835d
                       655d6eba5ab075f86b4813954b745b45a576cbd7
                       fffef5afabe18df4a95421d3cce128fd71360a30
                       c7bc27b4fe3a1d068b40f7dbfcd7184035635d37
                       1ed2947683f7de49cb170dac3428c1534f2d0152
                       1c2ec19c8c146249af0e812bd580044434d57106
                       ee21e38b613a8c878293fafe549d3ee549cbb408
                       95c5147ca724a0768006a0d7a95004f1f83e794b
                       e46200362e9218e7f270f83ac840f1a9e51e2860
                       1df99cbffc802af3f37ae5ef0bb1bd7cc03e18f8
                       0e1df7d901eca457fb4775509a559421c0ba1adf
                       9c2b8361cc3a4576d057038c6dba2d5417aa56b4
                       959ef29cbac261e39e08fb2f65c9a20f36dbf28b
                       90e4edeec4902a317fbe1105069a4780990a9f48
                       b8aff2fb455edc71fe39047d984ea9d4423ee77f
                       69e077ec06e4f364aa1c3be15c03f7c4c5c2c09a
                       21679c872aa3e3886b650d3994e0502d82c2c16e
                       243c882933b485430216cc6f6e1f86a1c3d71afe
                       d5325775f258cdf7796be4176b01a4fd2bdb24de
                       af07e02a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:3d:bb:a7:6b:c6:35:85:57:e4:15:99:cf:6e:c3:7b:dc:7c:b6:4e]
            modulus: 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
    public exponent: 10001

]