Results

By type

          2022-04-15 05:03:42,354 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-15 05:03:43,507 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-15 05:03:44.293  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 15, 2022 5:03:46 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 15, 2022 5:03:46 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 15, 2022 5:03:46 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 15, 2022 5:03:46 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-15 05:03:47.043 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-15 05:03:47.329  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-15 05:03:47.515  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-15 05:03:48.497 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-15 05:03:48.502 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-15 05:03:48.505 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-15 05:03:48.512 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-15 05:03:48.560 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-15 05:03:48.563 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-15 05:03:48.695 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-15 05:03:49.419 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 15, 2022 5:03:50 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-15 05:03:50.435  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.944 seconds (JVM running for 10.989)
Apr 15, 2022 5:04:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-15 05:05:20.698  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 05:05:20.706 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 05:05:20.750 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-15 05:05:20.755 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 05:05:20.775  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-15 05:05:20.778  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 05:05:20.779  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 05:05:20.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 05:05:20.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 05:05:20.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 05:05:20.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 05:05:20.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 05:05:20.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 05:05:20.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 05:05:20.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 05:05:20.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 05:05:21.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 05:05:21.547  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 05:05:21.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 05:05:21.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 05:05:21.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 05:05:21.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 05:05:21.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 05:05:21.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 05:05:21.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 05:05:21.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 05:05:21.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 05:05:21.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 05:05:21.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 05:05:21.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 05:05:21.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 05:05:21.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 05:05:21.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: caff75ac470b2c679456886346a15a580ffe46ddcc25016c38a9ab1b4fd2adc62ef59621d38a1c54c74908a461be735268392ffe301aff04b7c35dec35996e9570cf4e73941013fd26f9a32f7f342e43a8c89da33431d21eb354b080a3c18d6f6a5e7e5140024a50e158edb32fe8293d3fc993e7b59aa2504469cb9b3f43af597b096cd625acb9846447a1172ee12c60eb0730b006eeabdeaf0a5ff15f21edd9f82f83b81f452d85a3bdff42bde8f188a93a2ac89fce5f8ecedae29a49a6284820ca5a446ce41fd21c567e8ed215cf680e13b68f3f04f3239f5ea00758daf33bf426de53c8b475850489d02941f03f2c7da69827183b38409351bc70b1e4d7afe478cfeff9702033dca8f14fb887604d41f99d989b381f85ae3d1fe36f450d0dafc922397642ae00372b57bce226f24870f36b5dad8fffa97c289e45cfa1667fcf80dcf7a71de95de67c974408403fa9cca052364d77fc8f0de2665ac2bf09c20e2769f85d4e017ab86c59e6ec06237cf21258f50d11759ec68480781e6decbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:c9:42:94:85:7b:2e:9e:b4:ba:bf:36:a5:51:0e:7c:87:fa:40:92]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:19:02.825  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:19:02.828 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:19:02.831 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-15 06:19:02.832 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:19:02.833  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-15 06:19:02.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:19:02.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:19:02.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:19:02.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:19:02.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:19:02.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:19:02.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:19:02.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:19:02.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:19:03.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:19:03.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:19:03.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:19:03.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:19:03.127  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:19:03.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:19:03.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:19:03.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:19:03.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:19:03.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:19:03.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:19:03.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:19:03.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:19:03.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:19:03.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:19:03.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:19:03.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: caff75ac470b2c679456886346a15a580ffe46ddcc25016c38a9ab1b4fd2adc62ef59621d38a1c54c74908a461be735268392ffe301aff04b7c35dec35996e9570cf4e73941013fd26f9a32f7f342e43a8c89da33431d21eb354b080a3c18d6f6a5e7e5140024a50e158edb32fe8293d3fc993e7b59aa2504469cb9b3f43af597b096cd625acb9846447a1172ee12c60eb0730b006eeabdeaf0a5ff15f21edd9f82f83b81f452d85a3bdff42bde8f188a93a2ac89fce5f8ecedae29a49a6284820ca5a446ce41fd21c567e8ed215cf680e13b68f3f04f3239f5ea00758daf33bf426de53c8b475850489d02941f03f2c7da69827183b38409351bc70b1e4d7afe478cfeff9702033dca8f14fb887604d41f99d989b381f85ae3d1fe36f450d0dafc922397642ae00372b57bce226f24870f36b5dad8fffa97c289e45cfa1667fcf80dcf7a71de95de67c974408403fa9cca052364d77fc8f0de2665ac2bf09c20e2769f85d4e017ab86c59e6ec06237cf21258f50d11759ec68480781e6decbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:2c:cd:82:86:80:10:d1:bf:b4:06:c3:40:88:9e:35:ac:a5:88:bd]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:19:26.454  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:19:26.455 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:19:26.457 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:19:26.457 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:19:26.458  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:19:26.458  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:19:26.459  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:19:26.459 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:19:26.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:19:26.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:19:26.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:19:26.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:19:26.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:19:26.475 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:19:26.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:19:26.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:19:26.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:19:26.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:19:26.654  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:19:26.655  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:19:26.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:19:26.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:19:26.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:19:26.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:19:26.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:19:26.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:19:26.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:19:26.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:19:26.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:19:26.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:19:26.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:b2:a4:01:ef:dc:4d:09:4c:d0:d3:71:90:22:82:af:23:cb:fe:80]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:21:14.258  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:21:14.259 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:21:14.262 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-15 06:21:14.263 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:21:14.264  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-15 06:21:14.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:21:14.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:21:14.265 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:21:14.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:21:14.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:21:14.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:21:14.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:21:14.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:21:14.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:21:14.425  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:21:14.425  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:21:14.426 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:21:14.426 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:21:14.428  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:21:14.429  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:21:14.429 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:21:14.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:21:14.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:21:14.431 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:21:14.431 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:21:14.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:21:14.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:21:14.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:21:14.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:21:14.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:21:14.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:00:71:7f:c9:ed:17:df:73:86:b6:95:8f:53:e2:26:44:b5:18:08]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:22:32.097  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:22:32.106 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:22:32.108 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-15 06:22:32.109 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:22:32.109  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-15 06:22:32.110  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:22:32.110  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:22:32.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:22:32.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:22:32.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:22:32.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:22:32.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:22:32.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:22:32.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:22:32.253  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:22:32.255  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:22:32.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:22:32.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:22:32.258  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:22:32.259  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:22:32.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:22:32.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:22:32.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:22:32.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:22:32.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:22:32.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:22:32.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:22:32.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:22:32.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:22:32.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:22:32.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:5e:f5:b4:2f:7b:ea:a9:1a:3d:39:43:2f:76:e0:50:98:39:f4:ca]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:24:15.534  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:24:15.536 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:24:15.538 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-15 06:24:15.539 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:24:15.539  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-15 06:24:15.540  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:24:15.540  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:24:15.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:24:15.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:24:15.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:24:15.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:24:15.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:24:15.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:24:15.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:24:15.676  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:24:15.677  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:24:15.678 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:24:15.678 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:24:15.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:24:15.680  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:24:15.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:15.681 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:15.681 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:15.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:15.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:15.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:15.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:15.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:15.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:15.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:24:15.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: caff75ac470b2c679456886346a15a580ffe46ddcc25016c38a9ab1b4fd2adc62ef59621d38a1c54c74908a461be735268392ffe301aff04b7c35dec35996e9570cf4e73941013fd26f9a32f7f342e43a8c89da33431d21eb354b080a3c18d6f6a5e7e5140024a50e158edb32fe8293d3fc993e7b59aa2504469cb9b3f43af597b096cd625acb9846447a1172ee12c60eb0730b006eeabdeaf0a5ff15f21edd9f82f83b81f452d85a3bdff42bde8f188a93a2ac89fce5f8ecedae29a49a6284820ca5a446ce41fd21c567e8ed215cf680e13b68f3f04f3239f5ea00758daf33bf426de53c8b475850489d02941f03f2c7da69827183b38409351bc70b1e4d7afe478cfeff9702033dca8f14fb887604d41f99d989b381f85ae3d1fe36f450d0dafc922397642ae00372b57bce226f24870f36b5dad8fffa97c289e45cfa1667fcf80dcf7a71de95de67c974408403fa9cca052364d77fc8f0de2665ac2bf09c20e2769f85d4e017ab86c59e6ec06237cf21258f50d11759ec68480781e6decbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:60:48:06:e8:ac:91:8e:e3:80:6f:d7:25:16:40:f2:0c:28:50:fa]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:24:31.609  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:24:31.611 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:24:31.612 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:24:31.613 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:24:31.613  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:24:31.614  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:24:31.614  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:24:31.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:24:31.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:24:31.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:24:31.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:24:31.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:24:31.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:24:31.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:24:31.770  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:24:31.771  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:24:31.773 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:24:31.774 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:24:31.776  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:24:31.777  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:24:31.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:31.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:31.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:31.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:31.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:31.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:31.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:31.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:31.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:31.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:24:31.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:e5:a3:a5:e9:9f:ba:66:d2:25:e2:3f:bd:25:9c:47:1b:1a:22:23]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:24:32.642  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:24:32.644 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:24:32.646 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-15 06:24:32.647 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:24:32.647  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-15 06:24:32.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:24:32.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:24:32.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:24:32.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:24:32.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:24:32.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:24:32.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:24:32.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:24:32.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:24:32.784  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:24:32.785  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:24:32.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:24:32.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:24:32.787  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:24:32.788  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:24:32.788 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:32.788 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:32.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:32.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:32.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:32.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:32.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:24:32.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:24:32.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:24:32.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:24:32.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:64:9b:63:ad:0c:77:75:02:6e:33:42:62:be:8c:09:f6:00:de:48]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:28:28.749  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:28:28.752 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:28:28.756 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:28:28.758 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:28:28.758  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:28:28.759  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:28:28.759  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:28:28.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:28:28.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:28:28.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:28:28.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:28:28.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:28:28.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:28:28.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:28:28.940  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:28:28.941  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:28:28.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:28:28.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:28:28.942  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:28:28.943  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:28:28.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:28:28.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:28:28.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:28:28.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:28:28.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:28:28.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:28:28.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:28:28.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:28:28.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:28:28.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:28:28.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:fa:21:00:18:d3:a5:df:7a:48:2f:98:2e:15:8f:b1:83:ee:08:f7]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:33:34.524  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:33:34.527 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:33:34.529 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:33:34.530 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:33:34.530  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:33:34.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:33:34.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:33:34.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:33:34.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:33:34.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:33:34.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:33:34.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:33:34.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:33:34.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:33:34.723  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:33:34.724  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:33:34.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:33:34.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:33:34.726  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:33:34.726  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:33:34.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:33:34.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:33:34.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:33:34.728 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:33:34.728 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:33:34.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:33:34.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:33:34.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:33:34.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:33:34.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:33:34.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:c8:07:7d:ef:3f:6e:79:c2:c9:52:5d:c8:50:7d:6e:2b:50:07:5a]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:37:42.536  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:37:42.537 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:37:42.539 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:37:42.540 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:37:42.540  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:37:42.541  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:37:42.542  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:37:42.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:37:42.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:37:42.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:37:42.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:37:42.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:37:42.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:37:42.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:37:42.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:37:42.715  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:37:42.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:37:42.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:37:42.717  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:37:42.717  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:37:42.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:37:42.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:37:42.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:37:42.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:37:42.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:37:42.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:37:42.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:37:42.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:37:42.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:37:42.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:37:42.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:63:35:a3:41:58:f7:c7:46:f6:06:39:a5:d5:9e:34:be:98:a9:b3]
            modulus: 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
    public exponent: 10001

] 
2022-04-15 06:41:09.235  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-15 06:41:09.237 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-15 06:41:09.239 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:41:09.240 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-15 06:41:09.241  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-15 06:41:09.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-15 06:41:09.242  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-15 06:41:09.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-15 06:41:09.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-15 06:41:09.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-15 06:41:09.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-15 06:41:09.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:41:09.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-15 06:41:09.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:41:09.385  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-15 06:41:09.386  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-15 06:41:09.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-15 06:41:09.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-15 06:41:09.388  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-15 06:41:09.389  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-15 06:41:09.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:41:09.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:41:09.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:41:09.391 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:41:09.391 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:41:09.392 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:41:09.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-15 06:41:09.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-15 06:41:09.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-15 06:41:09.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-15 06:41:09.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693816962607642629313993967485239363044513822668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 15 05:01:08 UTC 2022
           Final Date: Wed Apr 14 05:01:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:e6:23:5d:61:bb:69:de:ff:07:a7:d1:b6:df:24:13:38:81:12:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 74285b6565da854cad7f6e12b4d1a0ed7c1ef03c
                       d0fbc25fdf8e4373fb1e66803eae1bf501137d4c
                       fd3bf7c0b29d774a11f9e92643e90e069a8dbfe3
                       f82f8473c89484510e04ee882b93ddbdf2673ed7
                       a425d6c9c909590c650f63d429f01c57d5b77f27
                       a8b7632831d6dc925eef4694333679d2f5ca3eec
                       a8a9ea7e4104c95ceda96058876a83c438bd5f10
                       a58a092a1efa8e13d1b7f2688379724b147d5db3
                       8ebd84769c66a08ff5b6f42077d18c907ba3a274
                       1db9543369e98c2b055386c431aacb47103db8b0
                       9aaf2685830c7b5eb4d6e8804407f331a94e3d90
                       640bf3a23ee635779c422c03fd47be48c62e4349
                       7f81150dfad6a1c66c026a405e35d91b4514399a
                       ad287f7bad4aedb2fa04ffc2d8c0e50f7678a234
                       5ff92024bccb97f222a0f830d57f8722498392ea
                       f9e2185e808847d9bed7027f926bd9d07f6c5182
                       2c9b87e0e2c0eb164fa9862014d8ca2b01fba4d9
                       839de7ed894055e5d02e74536935316ad4ad28e7
                       5daf0dcda1d846538026cffd111324e4d5033edf
                       858fdb47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:0b:1f:f8:83:86:03:20:25:54:ca:ad:cc:fb:84:ab:a1:9d:85:aa]
            modulus: c16cbbe3fa4bacb6b471c5b9572edea3c89f6e733d349753d7d36375eaf4ebb79a9c462f1823204c7c8e17cb02b0a7583503d75a0f23f243af7d38c37581972eed4c0ee2ecab3c12d2de70cdadb1401e084bb29600585bf13e0c3260a882ee8c69de28562d0c1c81dd4eb6ede543fab0357dc569c5dd6b4d2067e35f37cbe3375971e9877710eb37ba3ae1482c65df6c353f0cc0942b802efb472a725885ad7c7400d1d296a5505c2ab7e771e75545824af1119de25b4b162f322df162f5f1228fbd5a9da8cff373921e63736191898e1ad160ade4decc80f7f418c61201c08784fb6af4f8ce700208398894c710f9075629216210a23ed0624089e04709db2b
    public exponent: 10001

]