Results

By type

          2022-03-31 12:47:57,720 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-31 12:47:58,474 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-31 12:47:59.266  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 31, 2022 12:48:01 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 31, 2022 12:48:01 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 31, 2022 12:48:01 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 31, 2022 12:48:01 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-31 12:48:02.121 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-31 12:48:02.405  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-31 12:48:02.597  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-31 12:48:03.324 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-31 12:48:03.327 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-31 12:48:03.328 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-31 12:48:03.333 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-31 12:48:03.372 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-31 12:48:03.376 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-31 12:48:03.501 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-31 12:48:04.043 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 31, 2022 12:48:04 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-31 12:48:04.934  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.962 seconds (JVM running for 9.766)
Mar 31, 2022 12:48:35 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-31 12:49:00.300  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 12:49:00.308 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 12:49:00.354 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-31 12:49:00.358 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 12:49:00.374  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-31 12:49:00.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 12:49:00.378  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 12:49:00.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 12:49:00.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 12:49:00.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 12:49:00.390 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 12:49:00.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 12:49:00.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 12:49:00.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 12:49:00.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 12:49:00.442 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 12:49:01.384  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 12:49:01.388  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 12:49:01.389 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 12:49:01.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 12:49:01.404  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 12:49:01.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 12:49:01.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 12:49:01.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 12:49:01.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 12:49:01.419 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 12:49:01.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 12:49:01.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 12:49:01.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 12:49:01.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 12:49:01.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 12:49:01.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 12:49:01.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:93:ff:dc:9d:c4:fe:e6:51:13:e7:62:fe:f7:f1:1a:9d:6a:47:4f]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:03:30.080  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:03:30.084 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:03:30.087 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-31 14:03:30.088 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:03:30.089  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-31 14:03:30.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:03:30.091  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:03:30.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:03:30.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:03:30.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:03:30.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:03:30.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:03:30.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:03:30.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:03:30.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:03:30.366  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:03:30.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:03:30.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:03:30.372  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:03:30.373  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:03:30.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:03:30.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:03:30.385 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:03:30.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:03:30.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:03:30.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:03:30.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:03:30.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:03:30.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:03:30.390 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:03:30.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:39:4a:45:72:d0:fb:fd:07:0a:9a:44:2d:0f:4f:4d:a0:ed:3b:48]
            modulus: d17009997fbeb7f3f9222b5bc0f999bdaaae73eab271cda54e715d4235310d8c7ceb160f6d7ace0b7fc1563d622843f47628e12c40aacc142d8101244e27ed02fbcd0f50a8684fa031a73fc2b3b375c7f507246cc820090a1c1dbc4a0e2cb734f57bc8a1935708b5b1227f6e911d4b4fe1f7317f53c150ec965e1cd03d8324675cff79a11b1ace3afe7428d64f9247a67d712ad791b4facd398f986435df958177d9386f9a771e5c8b851b1efc8e96d5d6df6cf7690101fef265ec2125d18d9cfb5b18f388403556399ae8d9c92ca322245d5a3fabf529a40cf65ceb59a32ddc7e7269c43a93b5e22ec4538e496f70bbca12a12b7278298341b4243d3fac665d
    public exponent: 10001

] 
2022-03-31 14:03:58.611  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:03:58.612 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:03:58.613 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:03:58.614 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:03:58.615  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:03:58.616  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:03:58.616  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:03:58.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:03:58.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:03:58.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:03:58.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:03:58.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:03:58.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:03:58.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:03:58.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:03:58.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:03:58.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:03:58.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:03:58.810  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:03:58.810  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:03:58.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:03:58.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:03:58.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:03:58.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:03:58.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:03:58.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:03:58.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:03:58.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:03:58.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:03:58.818 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:03:58.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:f1:e0:ed:fa:46:8e:7f:f9:2a:00:ae:26:08:4b:cd:2d:51:48:8a]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:05:46.984  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:05:46.985 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:05:46.987 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-31 14:05:46.987 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:05:46.988  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-31 14:05:46.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:05:46.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:05:46.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:05:46.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:05:46.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:05:46.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:05:46.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:05:46.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:05:46.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:05:47.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:05:47.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:05:47.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:05:47.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:05:47.182  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:05:47.182  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:05:47.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:05:47.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:05:47.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:05:47.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:05:47.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:05:47.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:05:47.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:05:47.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:05:47.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:05:47.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:05:47.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:66:f6:7b:41:67:6a:ee:c9:7d:d6:69:d9:f4:1a:95:26:51:8f:83]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:07:17.717  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:07:17.718 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:07:17.719 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-31 14:07:17.720 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:07:17.721  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-31 14:07:17.721  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:07:17.722  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:07:17.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:07:17.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:07:17.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:07:17.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:07:17.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:07:17.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:07:17.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:07:17.930  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:07:17.930  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:07:17.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:07:17.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:07:17.933  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:07:17.933  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:07:17.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:07:17.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:07:17.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:07:17.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:07:17.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:07:17.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:07:17.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:07:17.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:07:17.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:07:17.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:07:17.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:00:f4:68:fa:3a:b2:41:1c:ec:4b:3f:78:e3:59:c0:97:ea:5d:46]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:08:45.746  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:08:45.748 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:08:45.749 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 14:08:45.758 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:08:45.760  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 14:08:45.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:08:45.764  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:08:45.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:08:45.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:08:45.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:08:45.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:08:45.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:08:45.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:08:45.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:08:45.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:08:45.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:08:45.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:08:45.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:08:45.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:08:45.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:08:45.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:08:45.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:08:45.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:08:45.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:08:45.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:08:45.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:08:45.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:08:45.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:08:45.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:08:45.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:08:45.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:79:ad:a1:6f:58:59:bd:d3:93:1b:3f:25:49:88:d7:95:b7:b1:7d]
            modulus: f44c021535bb8f5328811ec3a9360d26355efc00f1f2226a7300603a070c65e2c015cc4f7421f36557a19d79fc7a6b554f5bbf44955b8ae8cfeaefbb552cc8196f50f2e7c8290f6d689befc0f2d892b2a56a03cc611be8c95418af188b3112cbca7b78308edacfde6859805edd303613661794d07b8eb23fc269af698f7017d1eefb6693176e048f4c8bd2888727e4034da1d1d9a9ceab4ec357ff6cf31081d70b9cc8ffd026185ee62fe50a7273877e5048fdde4462a6b464214abe7aa61faf0b0c7a0d35fe9e78f5868ab71cb173ea13232f81ee9e2918039b676f70014bec228ad286ad34babecc467ff8a68632378f7bdd6379dd93e66dbd8463c12baae7
    public exponent: 10001

] 
2022-03-31 14:08:55.409  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:08:55.410 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:08:55.414 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:08:55.415 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:08:55.415  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:08:55.415  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:08:55.416  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:08:55.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:08:55.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:08:55.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:08:55.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:08:55.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:08:55.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:08:55.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:08:55.588  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:08:55.589  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:08:55.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:08:55.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:08:55.595  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:08:55.595  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:08:55.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:08:55.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:08:55.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:08:55.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:08:55.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:08:55.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:08:55.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:08:55.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:08:55.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:08:55.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:08:55.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:ce:bc:fd:a1:e1:9c:bb:a8:dc:87:ce:4a:76:91:ab:b5:2c:c7:a8]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:09:22.632  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:09:22.633 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:09:22.635 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 14:09:22.636 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:09:22.636  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 14:09:22.637  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:09:22.637  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:09:22.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:09:22.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:09:22.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:09:22.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:09:22.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:09:22.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:09:22.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:09:22.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:09:22.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:09:22.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:09:22.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:09:22.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:09:22.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:09:22.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:09:22.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:09:22.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:09:22.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:09:22.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:09:22.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:09:22.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:09:22.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:09:22.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:09:22.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:09:22.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:18:51:3e:7e:38:f2:5c:ce:1e:a8:f7:23:ea:44:29:aa:1c:a8:1f]
            modulus: dddfb9704d0f64bb5f06e631625c72c3cfdbadc7b00085c87e2e35def5f5142f21f2b3f6afa1c03aed231f160a9c874ab1572f1e37dcb43b354893c661b8ffda3bb705394c29358c77c9994fb746fdb07247c69cca2cc78f3efa83382af0296581de2660c6f02c7b4e054215fd45d91f3f3685cc40edec6440fec07f05a7694eefd43c37254f71270a9154d2dc5fe87b0545b253b6b8e067ac83f87ff9896ac8f03e1fa7755ce148a1cb685005914d2284753ce2dbb011b8deda13e36183fee247b67272de22d411a40313bdc24f19ff5fbfbfadc2eecb5c8792c2274d697fffd5589d720fc9c01f88b6ac8499bc05287a1f6a1604d6f5d4c29d52f8e3404809
    public exponent: 10001

] 
2022-03-31 14:11:14.581  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:11:14.583 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:11:14.585 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:11:14.586 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:11:14.587  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:11:14.587  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:11:14.588  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:11:14.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:11:14.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:11:14.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:11:14.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:11:14.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:11:14.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:11:14.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:11:14.815  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:11:14.817  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:11:14.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:11:14.818 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:11:14.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:11:14.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:11:14.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:11:14.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:11:14.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:11:14.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:11:14.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:11:14.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:11:14.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:11:14.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:11:14.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:11:14.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:11:14.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:34:ac:0f:9f:4c:63:8f:27:33:4c:0a:df:8c:d0:5e:93:e5:0c:ca]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:14:36.601  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:14:36.603 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:14:36.604 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:14:36.604 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:14:36.604  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:14:36.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:14:36.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:14:36.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:14:36.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:14:36.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:14:36.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:14:36.612 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:14:36.612 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:14:36.612 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:14:36.796  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:14:36.797  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:14:36.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:14:36.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:14:36.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:14:36.804  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:14:36.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:14:36.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:14:36.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:14:36.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:14:36.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:14:36.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:14:36.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:14:36.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:14:36.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:14:36.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:14:36.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:b3:6e:12:2b:91:43:e2:3b:17:5f:02:e4:51:28:48:a6:48:dd:9a]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:18:11.321  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:18:11.323 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:18:11.326 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:18:11.326 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:18:11.327  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:18:11.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:18:11.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:18:11.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:18:11.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:18:11.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:18:11.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:18:11.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:18:11.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:18:11.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:18:11.572  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:18:11.573  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:18:11.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:18:11.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:18:11.575  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:18:11.575  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:18:11.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:18:11.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:18:11.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:18:11.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:18:11.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:18:11.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:18:11.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:18:11.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:18:11.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:18:11.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:18:11.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:90:b4:bd:a2:d7:ef:42:08:4c:43:b5:35:f5:09:d4:c1:f3:e0:a1]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:20:13.770  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:20:13.771 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:20:13.773 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:20:13.774 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:20:13.775  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:20:13.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:20:13.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:20:13.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:20:13.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:20:13.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:20:13.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:20:13.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:20:13.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:20:13.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:20:13.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:20:13.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:20:13.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:20:13.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:20:13.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:20:13.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:20:13.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:20:13.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:20:13.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:20:13.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:20:13.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:20:13.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:20:13.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:20:13.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:20:13.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:20:13.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:20:13.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:c7:4d:14:a3:4e:8f:45:e4:b0:b9:5c:33:c0:0c:75:90:1b:ea:45]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:23:48.131  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:23:48.132 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:23:48.134 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:23:48.134 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:23:48.135  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:23:48.136  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:23:48.136  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:23:48.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:23:48.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:23:48.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:23:48.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:23:48.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:23:48.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:23:48.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:23:48.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:23:48.306  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:23:48.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:23:48.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:23:48.308  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:23:48.308  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:23:48.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:23:48.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:23:48.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:23:48.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:23:48.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:23:48.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:23:48.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:23:48.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:23:48.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:23:48.313 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:23:48.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:78:ed:bc:ca:20:69:58:a1:e9:94:62:3a:8d:ee:71:54:75:fe:34]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:25:43.329  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:25:43.331 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:25:43.333 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:25:43.334 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:25:43.335  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:25:43.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:25:43.336  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:25:43.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:25:43.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:25:43.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:25:43.342 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:25:43.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:25:43.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:25:43.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:25:43.527  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:25:43.527  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:25:43.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:25:43.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:25:43.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:25:43.530  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:25:43.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:25:43.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:25:43.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:25:43.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:25:43.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:25:43.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:25:43.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:25:43.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:25:43.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:25:43.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:25:43.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:4f:88:8a:4f:05:56:79:4a:c5:1e:b6:63:8b:b1:33:85:85:9e:35]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:29:14.647  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:29:14.648 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:29:14.650 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:29:14.650 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:29:14.651  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:29:14.651  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:29:14.651  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:29:14.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:29:14.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:29:14.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:29:14.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:29:14.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:29:14.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:29:14.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:29:14.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:29:14.840  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:29:14.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:29:14.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:29:14.842  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:29:14.842  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:29:14.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:29:14.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:29:14.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:29:14.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:29:14.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:29:14.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:29:14.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:29:14.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:29:14.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:29:14.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:29:14.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:b0:38:f9:44:24:f2:98:ad:94:f1:bb:3c:78:33:45:0d:40:1d:cd]
            modulus: cbf5193c8bb5fd1b1f41b2fe877b29b8579db5b4844bf2383a2e874250d02bbd84fffd67647de7ad2d8788d8bb664c1c1998de7d4ddcb8851dcf6c067dbd5afb98b4120bf87bd5c2c658b4b9f4bf599e50451eded47de37b05013127fd3c5cba50b44617e7bace579f36c982d632c237cc3d6352a36be9d83ac134c4f9a4bd783497ed8d2492fa7c64a80078efee1bb4b0b1eea3e23c6f3d0fc8a2c9ff2894560da4f7fad6084ef2b8cbe6933617932e22b5b176cf9023f0ab1c0d60ef88ab6f7c428811d1021ea82d3fff314429950485953c09c417e485bed903adb1c917234527d1bd3ca488c1ffe733efdcf01fb6e40ed7cc3c8bb1f8be3fe4edf56a07d5
    public exponent: 10001

] 
2022-03-31 14:32:23.380  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:32:23.381 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:32:23.382 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:32:23.383 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:32:23.383  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:32:23.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:32:23.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:32:23.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:32:23.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:32:23.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:32:23.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:32:23.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:32:23.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:32:23.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:32:23.617  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:32:23.618  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:32:23.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:32:23.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:32:23.620  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:32:23.620  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:32:23.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:32:23.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:32:23.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:32:23.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:32:23.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:32:23.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:32:23.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:32:23.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:32:23.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:32:23.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:32:23.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:29:3f:a2:80:87:64:14:44:eb:80:be:f6:a0:f6:01:45:ac:c3:54]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:35:53.026  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:35:53.028 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:35:53.030 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:35:53.030 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:35:53.031  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:35:53.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:35:53.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:35:53.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:35:53.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:35:53.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:35:53.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:35:53.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:35:53.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:35:53.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:35:53.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:35:53.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:35:53.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:35:53.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:35:53.275  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:35:53.275  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:35:53.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:35:53.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:35:53.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:35:53.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:35:53.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:35:53.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:35:53.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:35:53.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:35:53.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:35:53.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:35:53.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:c6:fd:c6:3c:86:73:9f:f0:c0:ca:7a:f6:3b:22:6e:ab:79:0e:cf]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:38:14.014  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:38:14.015 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:38:14.017 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 14:38:14.017 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:38:14.018  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 14:38:14.018  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:38:14.019  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:38:14.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:38:14.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:38:14.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:38:14.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:38:14.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:38:14.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:38:14.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:38:14.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:38:14.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:38:14.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:38:14.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:38:14.208  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:38:14.208  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:38:14.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:38:14.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:38:14.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:38:14.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:38:14.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:38:14.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:38:14.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:38:14.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:38:14.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:38:14.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:38:14.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:2c:89:a4:3a:15:56:2f:fa:6a:84:9a:32:c8:52:2f:c2:46:bd:eb]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:38:18.219  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:38:18.220 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:38:18.221 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 14:38:18.222 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:38:18.222  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 14:38:18.223  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:38:18.223  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:38:18.223 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:38:18.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:38:18.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:38:18.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:38:18.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:38:18.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:38:18.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:38:18.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:38:18.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:38:18.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:38:18.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:38:18.354  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:38:18.354  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:38:18.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:38:18.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:38:18.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:38:18.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:38:18.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:38:18.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:38:18.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:38:18.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:38:18.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:38:18.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:38:18.361 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:fa:19:e9:5f:50:6f:98:85:0b:66:5f:d2:07:1f:d3:ca:f5:ca:bb]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:40:54.853  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:40:54.854 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:40:54.856 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:40:54.857 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:40:54.857  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:40:54.858  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:40:54.858  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:40:54.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:40:54.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:40:54.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:40:54.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:40:54.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:40:54.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:40:54.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:40:55.005  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:40:55.006  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:40:55.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:40:55.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:40:55.007  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:40:55.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:40:55.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:40:55.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:40:55.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:40:55.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:40:55.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:40:55.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:40:55.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:40:55.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:40:55.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:40:55.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:40:55.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:d7:0c:07:26:f4:d1:e1:e7:2b:1b:e0:4f:d2:fd:23:34:b9:03:6e]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:44:50.787  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:44:50.790 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:44:50.792 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:44:50.792 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:44:50.793  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:44:50.794  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:44:50.794  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:44:50.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:44:50.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:44:50.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:44:50.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:44:50.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:44:50.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:44:50.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:44:51.027  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:44:51.028  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:44:51.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:44:51.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:44:51.031  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:44:51.031  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:44:51.031 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:44:51.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:44:51.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:44:51.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:44:51.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:44:51.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:44:51.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:44:51.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:44:51.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:44:51.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:44:51.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:87:84:c9:2a:f7:8c:53:89:4e:47:76:b7:e2:73:91:0d:ae:6c:69]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:51:49.504  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:51:49.507 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:51:49.509 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:51:49.509 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:51:49.510  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:51:49.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:51:49.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:51:49.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:51:49.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:51:49.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:51:49.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:51:49.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:51:49.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:51:49.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:51:49.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:51:49.756  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:51:49.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:51:49.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:51:49.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:51:49.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:51:49.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:51:49.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:51:49.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:51:49.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:51:49.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:51:49.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:51:49.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:51:49.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:51:49.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:51:49.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:51:49.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:5f:61:29:be:1a:3a:6a:d5:f3:72:57:3e:f6:d5:62:01:ab:df:fc]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:55:33.137  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:55:33.138 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:55:33.140 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:55:33.140 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:55:33.141  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:55:33.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:55:33.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:55:33.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:55:33.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:55:33.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:55:33.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:55:33.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:55:33.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:55:33.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:55:33.307  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:55:33.307  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:55:33.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:55:33.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:55:33.309  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:55:33.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:55:33.310 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:55:33.310 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:55:33.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:55:33.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:55:33.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:55:33.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:55:33.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:55:33.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:55:33.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:55:33.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:55:33.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:08:13:d9:0c:c6:5c:85:82:cd:2e:51:21:0e:0b:8c:d6:a1:1d:32]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 15:02:16.276  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 15:02:16.278 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 15:02:16.280 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 15:02:16.281 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 15:02:16.281  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 15:02:16.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 15:02:16.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 15:02:16.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 15:02:16.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 15:02:16.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 15:02:16.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 15:02:16.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 15:02:16.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 15:02:16.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 15:02:16.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 15:02:16.450  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 15:02:16.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 15:02:16.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 15:02:16.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 15:02:16.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 15:02:16.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 15:02:16.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 15:02:16.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 15:02:16.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 15:02:16.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 15:02:16.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 15:02:16.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 15:02:16.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 15:02:16.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 15:02:16.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 15:02:16.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:38:49:dd:f9:ac:69:ab:e6:5f:c9:df:c1:ee:e2:47:be:df:64:22]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 15:02:21.250  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 15:02:21.251 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 15:02:21.252 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 15:02:21.253 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 15:02:21.253  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 15:02:21.254  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 15:02:21.254  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 15:02:21.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 15:02:21.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 15:02:21.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 15:02:21.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 15:02:21.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 15:02:21.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 15:02:21.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 15:02:21.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 15:02:21.381  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 15:02:21.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 15:02:21.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 15:02:21.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 15:02:21.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 15:02:21.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 15:02:21.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 15:02:21.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 15:02:21.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 15:02:21.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 15:02:21.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 15:02:21.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 15:02:21.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 15:02:21.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 15:02:21.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 15:02:21.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618190893503127197575013523374170316258285343581
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 12:45:20 UTC 2022
           Final Date: Tue Mar 30 12:45:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7
                       3d378dcd0514d479fce6d192bded604e1f7d844d
                       105165cb4fc4988d203b0097b1a2187e54133697
                       7bcd94e77e17d7105913f767e5e536a7627431b8
                       e83376178ed8a0810b86b47309b80708b2cd8a34
                       4a615572d885599f255b3387b355905022b0e088
                       bbd81809c732dc8673194d0fa2aa31ac717d9410
                       6101c148318ecdf43c74d75a061380ace11fddff
                       338e15cd71cb12bdcafeece082bba2d85ebc06d0
                       5576fcb2a4b4f9d1890d5fc13806c1ca5480148a
                       da055ca96994f8c52286b2e83ced95f6c2ee34bf
                       6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d
                       f8d64210457d86533156523b6b7f9ba0844ae72b
                       bc35e5b423e044bb519ed988acc3a4cc33e0ff33
                       34bc5069df034793c6b5d4e95904b175909712cb
                       4dab8b136aa7e4798602eb82fa067c09fff5af81
                       7213dba126f950e9b125db6f0bdab564e06847e9
                       5a656d588225f2189112e96f35069441febaebe8
                       85c2bb028003dce3fc16b7f086bb9d98d151325b
                       d9b83780
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:d9:77:04:2c:ca:dd:80:de:09:c1:85:8d:b3:09:90:59:61:58:db]
            modulus: a1e1ad1cb78b6ca9887559c2ae75e58c26e5a598ecbe29fa58793f9d36585c18ec0d1d27ff993cb823fc845a9fe6ab32466cb8f309c84323d432eac6c74048d6f8bd9f7047f0b0ddd993879fa8e57e814f2e597eced599d0c9d1330965fd2a4d23f647c70897159aff94d6566d152043fa09a57c35b09c84aeaba9ef6680cb02ad917168b7cfb80108884faf44c77ff068dc423ce20b42b010601f7e54934429ed5ad15fe2dff018b5db335872baccbc2e1ba92d4e776f71adcecf396adacb8765611125eb3bf7ae6ac6212b000b11696bfa097013ca0c52ff134af0497e03cb91aafdeeffa2d11009cc4f8662bf9f2c8c14041b8b29b92eb1a149bb11b52195
    public exponent: 10001

]