Results

By type

          2022-03-31 05:25:31,491 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-31 05:25:33,141 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-31 05:25:34.797  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 31, 2022 5:25:39 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 31, 2022 5:25:39 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 31, 2022 5:25:39 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 31, 2022 5:25:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-31 05:25:41.310 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-31 05:25:41.873  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-31 05:25:42.337  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-31 05:25:43.430 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-31 05:25:43.434 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-31 05:25:43.436 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-31 05:25:43.440 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-31 05:25:43.513 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-03-31 05:25:43.517 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-31 05:25:43.663 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-31 05:25:45.201 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 31, 2022 5:25:46 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-31 05:25:46.867  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 16.713 seconds (JVM running for 19.849)
Mar 31, 2022 5:26:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-31 07:20:58.314  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:20:58.343 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:20:58.415 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-31 07:20:58.425 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:20:58.466  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-31 07:20:58.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:20:58.474  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:20:58.478 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:20:58.478 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:20:58.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:20:58.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:20:58.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:20:58.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:20:58.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:20:58.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:20:58.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:20:59.427  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:20:59.431  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:20:59.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:20:59.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:20:59.459  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:20:59.461  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:20:59.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:20:59.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:20:59.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:20:59.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:20:59.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:20:59.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:20:59.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:20:59.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:20:59.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:20:59.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:20:59.550 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:c7:75:fd:f2:7e:4d:fe:38:15:79:0a:1a:9a:8d:39:b6:1a:16:25]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:21:25.523  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:21:25.525 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:21:25.527 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:21:25.529 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:21:25.529  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:21:25.531  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:21:25.532  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:21:25.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:21:25.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:21:25.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:21:25.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:21:25.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:21:25.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:21:25.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:21:25.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:21:25.702  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:21:25.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:21:25.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:21:25.716  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:21:25.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:21:25.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:21:25.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:21:25.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:21:25.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:21:25.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:21:25.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:21:25.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:21:25.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:21:25.740 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:21:25.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:21:25.760 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:5f:d6:3b:5b:d9:9b:7d:d7:2f:dd:0a:cb:ce:4a:ec:9d:15:b2:b5]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:23:27.350  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:23:27.353 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:23:27.356 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-31 07:23:27.357 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:23:27.358  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-31 07:23:27.359  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:23:27.360  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:23:27.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:23:27.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:23:27.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:23:27.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:23:27.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:23:27.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:23:27.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:23:27.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:23:27.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:23:27.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:23:27.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:23:27.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:23:27.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:23:27.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:23:27.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:23:27.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:23:27.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:23:27.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:23:27.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:23:27.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:23:27.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:23:27.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:23:27.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:23:27.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:c9:4b:9f:9e:e3:39:6e:08:6e:69:74:89:b5:00:5d:46:17:e1:f7]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:24:35.279  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:24:35.281 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:24:35.283 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-31 07:24:35.284 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:24:35.285  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-31 07:24:35.286  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:24:35.286  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:24:35.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:24:35.288 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:24:35.289 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:24:35.295 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:24:35.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:24:35.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:24:35.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:24:35.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:24:35.524  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:24:35.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:24:35.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:24:35.530  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:24:35.531  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:24:35.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:24:35.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:24:35.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:24:35.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:24:35.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:24:35.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:24:35.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:24:35.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:24:35.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:24:35.540 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:24:35.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:7f:83:1e:92:80:f8:1c:f7:81:d0:8b:05:a4:7f:45:94:f0:c7:5d]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:26:27.777  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:26:27.779 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:26:27.782 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:26:27.783 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:26:27.784  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:26:27.786  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:26:27.787  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:26:27.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:26:27.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:26:27.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:26:27.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:26:27.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:26:27.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:26:27.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:26:27.974  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:26:27.976  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:26:27.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:26:27.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:26:27.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:26:27.980  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:26:27.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:26:27.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:26:27.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:26:27.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:26:27.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:26:27.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:26:27.988 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:26:27.988 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:26:27.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:26:27.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:26:27.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:96:ce:63:11:78:71:23:66:ea:e4:08:36:0a:06:74:36:73:a4:8e]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:27:47.485  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:27:47.487 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:27:47.490 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 07:27:47.491 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:27:47.491  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 07:27:47.492  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:27:47.492  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:27:47.493 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:27:47.493 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:27:47.494 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:27:47.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:27:47.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:27:47.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:27:47.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:27:47.681  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:27:47.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:27:47.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:27:47.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:27:47.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:27:47.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:27:47.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:27:47.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:27:47.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:27:47.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:27:47.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:27:47.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:27:47.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:27:47.690 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:27:47.690 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:27:47.691 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:27:47.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:01:67:a9:9a:00:67:a8:3c:42:32:6e:69:49:8d:d4:48:31:78:15]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:28:08.783  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:28:08.785 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:28:08.787 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 07:28:08.787 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:28:08.788  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 07:28:08.788  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:28:08.789  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:28:08.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:28:08.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:28:08.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:28:08.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:28:08.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:28:08.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:28:08.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:28:08.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:28:08.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:28:08.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:28:08.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:28:08.907  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:28:08.907  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:28:08.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:28:08.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:28:08.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:28:08.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:28:08.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:28:08.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:28:08.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:28:08.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:28:08.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:28:08.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:28:08.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:d5:e5:9f:e7:6e:10:0c:67:c4:bc:60:6c:54:fa:4d:1b:a3:f1:48]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:28:47.608  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:28:47.610 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:28:47.613 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:28:47.615 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:28:47.616  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:28:47.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:28:47.617  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:28:47.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:28:47.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:28:47.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:28:47.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:28:47.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:28:47.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:28:47.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:28:47.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:28:47.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:28:47.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:28:47.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:28:47.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:28:47.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:28:47.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:28:47.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:28:47.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:28:47.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:28:47.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:28:47.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:28:47.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:28:47.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:28:47.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:28:47.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:28:47.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:9e:97:e6:93:f7:f8:d3:8e:77:52:34:1f:27:b2:a1:66:f0:5d:ab]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:32:05.956  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:32:05.957 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:32:05.959 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:32:05.960 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:32:05.960  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:32:05.961  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:32:05.961  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:32:05.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:32:05.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:32:05.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:32:05.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:32:05.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:32:05.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:32:05.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:32:06.086  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:32:06.086  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:32:06.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:32:06.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:32:06.089  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:32:06.089  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:32:06.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:32:06.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:32:06.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:32:06.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:32:06.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:32:06.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:32:06.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:32:06.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:32:06.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:32:06.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:32:06.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: b4059f95e04e93ca78de45e74e2e7f0c0670694035d69b853ea94c120a1510483ce456da5c0c1b8c472f8ab34edbc451a6e4b004aca3e6090913158b0fb938e4412d5cb571784eb2757fc9d9ddc373ff2b70c8fa7503214284c861e51516321a3f1f3109ead9cdb623917d17bde2f4496c33dec4e07e2d549ce43a7ddb45d6aac54aa5a3e1261b19e6fae4da048d3471358a1c0cfc6bedfedd6155382d28a473a2d72adc1180ee5efa86854e52e5a89c1839d3ec8ac7898a97f7fc998f93a8f8ab563cf183e3a05dc4f270351a668351d2aaad49ff20ca8e5aa7e85e67052ff5377ade246f9eb998bee1f6a6ccbeb67c5328b5aac0472abd2013027b946bf9c63285b147c96fd27e7447799a9e80d878eecc968a8ac466913fe708e95277fc8bc9078fea9a09baa2b0e6e006d14bebca6fd191d3780b08b2337b1303f5f4942b9b4ec6b7321533a6d18bdd9b16f7bdad86c5f24169c518c5531b9d16e8a4d6096e9e000f1b6cf8231daab661ebf563d106c118bff0ccc55eeb72dd5190c37205
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:bd:e7:3c:32:0a:ee:40:6b:34:ae:12:df:4f:d1:dc:c3:0c:80:e5]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:35:36.958  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:35:36.961 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:35:36.964 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:35:36.965 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:35:36.966  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:35:36.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:35:36.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:35:36.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:35:36.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:35:36.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:35:36.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:35:36.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:35:36.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:35:36.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:35:37.155  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:35:37.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:35:37.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:35:37.157 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:35:37.159  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:35:37.159  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:35:37.160 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:35:37.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:35:37.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:35:37.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:35:37.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:35:37.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:35:37.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:35:37.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:35:37.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:35:37.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:35:37.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:f6:80:67:d2:11:4e:80:1c:23:23:04:5d:e0:30:08:81:7e:d3:b5]
            modulus: b617167bf2e9083dcc92634c27d6322eaeb8a82ac34290fc491c67b7a8d5fe2abaedeb56fe333a97f0bdfd72a9e7c9a3cc89d46537f0d45f258a2e3e9cb46113037dda7a35dac8640fbc1d20df22909effb89a2aa4c00d0f525d5ac2d0bbef1bf1e25f86454875372f58938e3ac51136bd5818ac1cc2222a6ba75450e22979e61f9550c06a9354f49e3b4558857d8e90deed071eb456676ec59783b09a91cda1a75a391f13d3875077d0f25ee84c433ed16181b51e498323eee445ad75f0adab2accfd1d9516b7438e84e6188c14f42ed6f3f26243cb24092c60f5e6c00c171aa8000f90f34bc862eeb9e18d2d7440aa1624afb046433c78a6be4eb949380a4b
    public exponent: 10001

] 
2022-03-31 07:37:58.315  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:37:58.318 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:37:58.321 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:37:58.322 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:37:58.322  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:37:58.323  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:37:58.324  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:37:58.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:37:58.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:37:58.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:37:58.336 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:37:58.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:37:58.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:37:58.339 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:37:58.422 ERROR 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Error encountered while processing response from CA server 

java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered
	at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source)
	at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
	at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
	at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)

2022-03-31 07:37:58.448 ERROR 1 [nio-8443-exec-6] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server 
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
	at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
	at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered
	at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source)
	at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171)
	... 61 more

2022-03-31 07:40:57.037  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:40:57.040 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:40:57.042 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:40:57.044 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:40:57.044  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:40:57.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:40:57.046  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:40:57.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:40:57.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:40:57.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:40:57.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:40:57.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:40:57.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:40:57.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:40:57.192  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:40:57.193  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:40:57.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:40:57.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:40:57.197  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:40:57.197  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:40:57.198 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:40:57.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:40:57.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:40:57.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:40:57.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:40:57.202 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:40:57.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:40:57.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:40:57.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:40:57.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:40:57.213 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:13:ad:48:65:f5:e8:7d:8d:ba:b9:09:53:cd:4f:40:c2:c5:87:d8]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:44:30.751  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:44:30.753 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:44:30.755 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:44:30.756 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:44:30.756  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:44:30.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:44:30.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:44:30.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:44:30.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:44:30.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:44:30.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:44:30.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:44:30.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:44:30.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:44:30.906  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:44:30.907  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:44:30.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:44:30.908 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:44:30.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:44:30.911  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:44:30.911 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:44:30.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:44:30.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:44:30.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:44:30.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:44:30.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:44:30.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:44:30.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:44:30.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:44:30.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:44:30.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:66:ea:6a:af:4d:72:21:f0:8d:23:09:9b:c0:c1:bc:21:65:56:65]
            modulus: a97467df4d37e2010eed60ca51a3da0b08a61923e4342babe42e0a3404b55bde8556bfcb7a27eead2e7d381c6a42bedeb192195246f2b674e3e117150d88cbd564a27615565d0143a38ceaff0b48cf3acfbccddfe9e52d0ec22fb7ed46c97b98fd7b0805ab5c444b7ed8b79077bb572d5b40cf0084d5e05d7ad45dd07f25b25498ded7bcdcc280b36e9f4bd2f7436f668d9c6dd27081115adaf7953499b65d0a046c70aeba9030436deeea2ea92b32ba32dfc3372790858bb07c9a47e453f30328de79b8baa4f5cec474e587a24c991678bfe7d1f2fcc4e7e0c2be01dff851dda9ff0c52d01bacf81581d3560a2d241136634922265ff406223f5969a5a99981
    public exponent: 10001

] 
2022-03-31 07:47:40.546  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:47:40.548 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:47:40.551 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:47:40.552 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:47:40.553  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:47:40.553  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:47:40.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:47:40.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:47:40.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:47:40.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:47:40.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:47:40.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:47:40.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:47:40.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:47:40.685  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:47:40.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:47:40.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:47:40.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:47:40.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:47:40.690  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:47:40.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:47:40.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:47:40.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:47:40.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:47:40.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:47:40.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:47:40.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:47:40.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:47:40.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:47:40.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:47:40.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: b4059f95e04e93ca78de45e74e2e7f0c0670694035d69b853ea94c120a1510483ce456da5c0c1b8c472f8ab34edbc451a6e4b004aca3e6090913158b0fb938e4412d5cb571784eb2757fc9d9ddc373ff2b70c8fa7503214284c861e51516321a3f1f3109ead9cdb623917d17bde2f4496c33dec4e07e2d549ce43a7ddb45d6aac54aa5a3e1261b19e6fae4da048d3471358a1c0cfc6bedfedd6155382d28a473a2d72adc1180ee5efa86854e52e5a89c1839d3ec8ac7898a97f7fc998f93a8f8ab563cf183e3a05dc4f270351a668351d2aaad49ff20ca8e5aa7e85e67052ff5377ade246f9eb998bee1f6a6ccbeb67c5328b5aac0472abd2013027b946bf9c63285b147c96fd27e7447799a9e80d878eecc968a8ac466913fe708e95277fc8bc9078fea9a09baa2b0e6e006d14bebca6fd191d3780b08b2337b1303f5f4942b9b4ec6b7321533a6d18bdd9b16f7bdad86c5f24169c518c5531b9d16e8a4d6096e9e000f1b6cf8231daab661ebf563d106c118bff0ccc55eeb72dd5190c37205
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:57:b4:79:89:cc:30:03:29:24:ec:9b:b1:04:c0:42:2c:35:11:79]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:48:41.219  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:48:41.220 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:48:41.222 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 07:48:41.222 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:48:41.223  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 07:48:41.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:48:41.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:48:41.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:48:41.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:48:41.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:48:41.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:48:41.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:48:41.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:48:41.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:48:41.367  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:48:41.369  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:48:41.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:48:41.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:48:41.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:48:41.373  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:48:41.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:48:41.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:48:41.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:48:41.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:48:41.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:48:41.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:48:41.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:48:41.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:48:41.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:48:41.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:48:41.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:91:d1:7c:aa:eb:0b:e4:7f:a2:6c:3a:e1:28:a3:61:f2:11:91:97]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 07:48:56.724  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:48:56.725 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:48:56.727 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 07:48:56.728 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:48:56.728  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 07:48:56.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:48:56.730  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:48:56.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:48:56.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:48:56.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:48:56.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:48:56.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:48:56.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:48:56.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:48:56.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:48:56.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:48:56.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:48:56.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:48:56.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:48:56.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:48:56.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:48:56.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:48:56.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:48:56.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:48:56.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:48:56.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:48:56.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:48:56.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:48:56.863 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:48:56.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:48:56.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:ad:f6:0a:25:ed:fd:8f:f2:47:cf:50:0b:44:c0:75:d3:99:c7:83]
            modulus: a8db0cc0ecf64b453cfb0dc85231cbd66820a4ae88f9ac4b3147c6e60b60c85db8584836b1f26680a7864a46efa85aa5f0e0a3831aa4e2db3544e67047fed53fe4dfeac96893fe26979327a3f501d71f662da0eed4b1dd1fd964021fb03f94511b40cc387a3d04f8fa13ec391d6fd749c257582b82b742fee4fb71ed5a129fa1a06cd82342b51a91dea4e3862fb362bdb1cc5d9c687bec94871f12cc13ed88ba9300ef983ae9c3390d12b402a6b23c4c1f8abe2b15d804f5b8d887e283e1e3d2e1faef3a48e227784b016e679cc0705cd56d55b989b2dc58b07c52bf072f95d251fc5b75de621a2ab96217b8a2ee2df5c0c1759c5481ad8539dbe8880ac8286d
    public exponent: 10001

] 
2022-03-31 07:51:28.844  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 07:51:28.845 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 07:51:28.847 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:51:28.848 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 07:51:28.849  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 07:51:28.850  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 07:51:28.850  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 07:51:28.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 07:51:28.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 07:51:28.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 07:51:28.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 07:51:28.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:51:28.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 07:51:28.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:51:28.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 07:51:28.971  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 07:51:28.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 07:51:28.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 07:51:28.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 07:51:28.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 07:51:28.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:51:28.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:51:28.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:51:28.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:51:28.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:51:28.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:51:28.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 07:51:28.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 07:51:28.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 07:51:28.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 07:51:28.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: b4059f95e04e93ca78de45e74e2e7f0c0670694035d69b853ea94c120a1510483ce456da5c0c1b8c472f8ab34edbc451a6e4b004aca3e6090913158b0fb938e4412d5cb571784eb2757fc9d9ddc373ff2b70c8fa7503214284c861e51516321a3f1f3109ead9cdb623917d17bde2f4496c33dec4e07e2d549ce43a7ddb45d6aac54aa5a3e1261b19e6fae4da048d3471358a1c0cfc6bedfedd6155382d28a473a2d72adc1180ee5efa86854e52e5a89c1839d3ec8ac7898a97f7fc998f93a8f8ab563cf183e3a05dc4f270351a668351d2aaad49ff20ca8e5aa7e85e67052ff5377ade246f9eb998bee1f6a6ccbeb67c5328b5aac0472abd2013027b946bf9c63285b147c96fd27e7447799a9e80d878eecc968a8ac466913fe708e95277fc8bc9078fea9a09baa2b0e6e006d14bebca6fd191d3780b08b2337b1303f5f4942b9b4ec6b7321533a6d18bdd9b16f7bdad86c5f24169c518c5531b9d16e8a4d6096e9e000f1b6cf8231daab661ebf563d106c118bff0ccc55eeb72dd5190c37205
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:59:1e:6b:4d:f5:80:90:b8:68:f3:91:44:88:b0:5c:8c:48:da:cc]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 08:14:55.395  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 08:14:55.399 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 08:14:55.407 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 08:14:55.408 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 08:14:55.409  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 08:14:55.411  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 08:14:55.412  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 08:14:55.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 08:14:55.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 08:14:55.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 08:14:55.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 08:14:55.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 08:14:55.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 08:14:55.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 08:14:55.588  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 08:14:55.589  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 08:14:55.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 08:14:55.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 08:14:55.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 08:14:55.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 08:14:55.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 08:14:55.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 08:14:55.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 08:14:55.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 08:14:55.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 08:14:55.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 08:14:55.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 08:14:55.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 08:14:55.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 08:14:55.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 08:14:55.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:8d:71:ff:9e:99:72:b6:0a:64:13:68:2a:50:51:e2:44:25:2c:9c]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 08:15:02.966  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 08:15:02.967 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 08:15:02.969 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 08:15:02.970 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 08:15:02.970  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 08:15:02.971  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 08:15:02.971  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 08:15:02.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 08:15:02.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 08:15:02.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 08:15:02.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 08:15:02.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 08:15:02.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 08:15:02.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 08:15:03.080  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 08:15:03.081  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 08:15:03.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 08:15:03.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 08:15:03.083  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 08:15:03.084  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 08:15:03.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 08:15:03.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 08:15:03.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 08:15:03.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 08:15:03.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 08:15:03.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 08:15:03.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 08:15:03.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 08:15:03.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 08:15:03.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 08:15:03.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301128614032609291462494067203259609595635396263
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 04:57:40 UTC 2022
           Final Date: Tue Mar 30 04:57:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd]
            modulus: b4059f95e04e93ca78de45e74e2e7f0c0670694035d69b853ea94c120a1510483ce456da5c0c1b8c472f8ab34edbc451a6e4b004aca3e6090913158b0fb938e4412d5cb571784eb2757fc9d9ddc373ff2b70c8fa7503214284c861e51516321a3f1f3109ead9cdb623917d17bde2f4496c33dec4e07e2d549ce43a7ddb45d6aac54aa5a3e1261b19e6fae4da048d3471358a1c0cfc6bedfedd6155382d28a473a2d72adc1180ee5efa86854e52e5a89c1839d3ec8ac7898a97f7fc998f93a8f8ab563cf183e3a05dc4f270351a668351d2aaad49ff20ca8e5aa7e85e67052ff5377ade246f9eb998bee1f6a6ccbeb67c5328b5aac0472abd2013027b946bf9c63285b147c96fd27e7447799a9e80d878eecc968a8ac466913fe708e95277fc8bc9078fea9a09baa2b0e6e006d14bebca6fd191d3780b08b2337b1303f5f4942b9b4ec6b7321533a6d18bdd9b16f7bdad86c5f24169c518c5531b9d16e8a4d6096e9e000f1b6cf8231daab661ebf563d106c118bff0ccc55eeb72dd5190c37205
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c
                       973b0349dab44bbab5a6407cef65cd8a09278583
                       76f6252fb18999812a978795be168c86846621c0
                       9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7
                       f0f1ca5689e722d93888b26b6240c76aea2af823
                       6b31b34d491b67bf9c21a0b0051d743847a1eb16
                       2e9af70c8a7df2888956270538b8ba15345269b4
                       3f700f8067741377efd0680bdf70b1dda882b305
                       51326770aaf60936d2ff7ac922db35186b59b5b9
                       c1a84522ea74adea352df5d23dfe646beab68ac1
                       98b269aaa09f4210e3fc037fbce370bd0b60a22b
                       30eb50a5517bdac12ca616c348afcfbe3b1f8f60
                       09ae45196248295152ae88499846ff6e7caa0c03
                       f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2
                       1f5963d726332805002dc442e6e526eba5ed649d
                       5438d01741648ffe6d6bbad80812e210085e1050
                       595983bad08ac567395adeb74d2d5169b90666cd
                       00be8760c3af704815c777cc97b092309632c749
                       5e71ca13f27482fccd68efa59e73473a6008725e
                       7084654d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:64:9c:2b:64:8e:98:2c:3d:15:02:fd:40:25:80:ad:a4:0b:c3:eb]
            modulus: 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
    public exponent: 10001

]