Results

By type

          2022-04-25 05:14:27,615 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-25 05:14:28,697 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-25 05:14:29.683  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 25, 2022 5:14:31 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 25, 2022 5:14:32 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 25, 2022 5:14:32 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 25, 2022 5:14:32 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-25 05:14:32.722 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-25 05:14:33.040  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-25 05:14:33.238  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-25 05:14:34.094 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-25 05:14:34.101 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-04-25 05:14:34.104 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-25 05:14:34.111 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-25 05:14:34.163 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-25 05:14:34.168 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-25 05:14:34.319 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-25 05:14:35.067 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 25, 2022 5:14:35 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-25 05:14:36.180  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.506 seconds (JVM running for 11.558)
Apr 25, 2022 5:14:54 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-25 05:15:04.391  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 05:15:04.402 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 05:15:04.464 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-25 05:15:04.472 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 05:15:04.496  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-25 05:15:04.500  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 05:15:04.501  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 05:15:04.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 05:15:04.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 05:15:04.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 05:15:04.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 05:15:04.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 05:15:04.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 05:15:04.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 05:15:04.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 05:15:04.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 05:15:05.647  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 05:15:05.653  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 05:15:05.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 05:15:05.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 05:15:05.670  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 05:15:05.671  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 05:15:05.672 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 05:15:05.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 05:15:05.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 05:15:05.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 05:15:05.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 05:15:05.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 05:15:05.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 05:15:05.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 05:15:05.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 05:15:05.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 05:15:05.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:42:f9:bd:c9:42:1b:2c:37:20:36:68:92:f3:dd:6a:24:e9:08:6d]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:42:22.438  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:42:22.442 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:42:22.444 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:42:22.445 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:42:22.446  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:42:22.447  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:42:22.447  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:42:22.448 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:42:22.448 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:42:22.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:42:22.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:42:22.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:42:22.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:42:22.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:42:22.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:42:22.872  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:42:22.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:42:22.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:42:22.877  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:42:22.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:42:22.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:42:22.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:42:22.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:42:22.881 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:42:22.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:42:22.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:42:22.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:42:22.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:42:22.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:42:22.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:42:22.891 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:dc:a3:e7:dc:be:61:9b:33:03:81:ae:85:ba:ed:de:b7:e6:46:6c]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:43:27.761  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:43:27.762 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:43:27.765 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-25 06:43:27.765 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:43:27.766  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-25 06:43:27.767  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:43:27.767  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:43:27.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:43:27.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:43:27.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:43:27.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:43:27.788 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:43:27.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:43:27.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:43:28.144  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:43:28.145  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:43:28.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:43:28.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:43:28.149  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:43:28.149  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:43:28.149 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:43:28.150 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:43:28.150 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:43:28.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:43:28.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:43:28.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:43:28.154 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:43:28.154 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:43:28.155 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:43:28.156 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:43:28.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: abf23ce92a0861f0d0465b14c9828eb467464739f370a1244582c8792518762edf88fb0c33002a09049fc6d1ded163602acc4567d61314770799b16419559aca09088366e8c1ccd4e102a5b6c9d68398b1561f9299ecada288e7275233541b64087df9d86db0c2af9495bad0be95b12624b5ce8b764976b42a4c491b2a81798162553f3d51214bc28585ed161bad4b10148633f28a313161ca64611d22b3c66090a251c009ff75f933c5e86661daeae0935a06bb27be5c53d482d8c7bb7b83a052d495f82970a6034ac9d6f50daa03d122576d2bfd6e86ae1ce9bde251e3fc554a188da516a72bdbd133347378f7f8d1514369e3a2c010a3cf57f87d209ae106ce028056c752c91ee040cb768d0002a539f9e4caaaa782d06f8f56559d8c161ab77105103e13b5381ec881c598d91b79e25d3c1c09d55c5e3038144af4dd68904c418ccef197cc85a47f46fd029bbc452c69b9affbeea0baee072abc34e8dafa62193267ba19115a5efd67ecf7082ef2490b1d77bf73b2b7d55f710f3fff1819
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:4c:59:e6:dc:42:55:cc:24:ba:b4:bd:f4:2a:44:c7:c8:0f:5d:ca]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:44:24.359  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:44:24.363 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:44:24.366 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-25 06:44:24.367 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:44:24.370  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-25 06:44:24.371  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:44:24.371  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:44:24.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:44:24.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:44:24.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:44:24.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:44:24.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:44:24.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:44:24.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:44:24.646  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:44:24.648  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:44:24.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:44:24.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:44:24.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:44:24.653  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:44:24.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:44:24.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:44:24.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:44:24.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:44:24.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:44:24.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:44:24.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:44:24.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:44:24.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:44:24.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:44:24.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:a9:90:33:e6:9b:97:b0:5d:15:0c:4a:c4:e2:ce:3c:6f:b3:b7:69]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:47:42.297  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:47:42.300 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:47:42.303 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-25 06:47:42.305 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:47:42.306  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-25 06:47:42.309  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:47:42.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:47:42.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:47:42.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:47:42.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:47:42.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:47:42.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:47:42.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:47:42.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:47:42.597  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:47:42.599  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:47:42.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:47:42.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:47:42.602  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:47:42.602  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:47:42.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:47:42.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:47:42.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:47:42.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:47:42.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:47:42.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:47:42.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:47:42.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:47:42.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:47:42.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:47:42.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:34:13:e7:15:a4:a3:cd:b2:0a:c6:f4:2b:a1:f0:7b:54:dd:f2:cd]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:50:31.554  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:50:31.557 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:50:31.560 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:50:31.561 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:50:31.562  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:50:31.563  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:50:31.563  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:50:31.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:50:31.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:50:31.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:50:31.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:50:31.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:50:31.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:50:31.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:50:31.947  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:50:31.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:50:31.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:50:31.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:50:31.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:50:31.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:50:31.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:50:31.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:50:31.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:50:31.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:50:31.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:50:31.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:50:31.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:50:31.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:50:31.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:50:31.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:50:31.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:e3:05:5b:a0:82:4b:31:55:0b:a8:8c:b6:d3:88:1a:62:f0:01:a9]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:50:39.198  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:50:39.199 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:50:39.201 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-25 06:50:39.202 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:50:39.202  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-25 06:50:39.203  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:50:39.204  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:50:39.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:50:39.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:50:39.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:50:39.210 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:50:39.210 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:50:39.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:50:39.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:50:39.609  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:50:39.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:50:39.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:50:39.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:50:39.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:50:39.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:50:39.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:50:39.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:50:39.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:50:39.616 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:50:39.616 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:50:39.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:50:39.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:50:39.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:50:39.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:50:39.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:50:39.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:cd:20:cf:47:fc:44:4c:b4:85:85:ff:f8:a8:d9:a0:2f:a7:77:61]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:51:35.323  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:51:35.325 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:51:35.329 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-25 06:51:35.330 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:51:35.331  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-25 06:51:35.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:51:35.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:51:35.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:51:35.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:51:35.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:51:35.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:51:35.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:51:35.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:51:35.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:51:35.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:51:35.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:51:35.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:51:35.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:51:35.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:51:35.701  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:51:35.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:51:35.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:51:35.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:51:35.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:51:35.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:51:35.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:51:35.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:51:35.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:51:35.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:51:35.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:51:35.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:61:97:4e:22:bc:55:f2:ed:a4:ef:3f:60:08:63:3f:71:57:d7:b6]
            modulus: b21cd8155f846098420e2fdf2bb775dc41645d77c3d99c6046024ad4218df8161089c37bcd9fd3a8dd2b2376ee173377553514684a7bbce87e874596f3d68ab1092112b5d3071352c389727eaa1223f49c3b8fba2546008945c3c90c2946fbe8c538476ca7e21d1381d91683516b1cfc1f50a5eacf6b40cec78815b47e2992f9e23051f2004d6dad52a0ca8d61d8bf10ec9e890a1bc4b31214b8769ee0839c250eba8b060e3bf114dcd835980dd984d3c7b73255773980ef1a275738d49ed8728e97cdd14fba81a95737525b50ad167f3bb659d2ec46adfb065547ef2ab257d37c9622dd1bd261c9ad8cf7a597a886e2ab45973c61ddb904d20c301aaf91dd7d
    public exponent: 10001

] 
2022-04-25 06:54:38.945  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:54:38.948 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:54:38.950 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:54:38.951 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:54:38.952  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:54:38.953  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:54:38.954  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:54:38.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:54:38.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:54:38.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:54:38.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:54:38.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:54:38.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:54:38.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:54:39.269  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:54:39.269  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:54:39.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:54:39.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:54:39.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:54:39.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:54:39.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:54:39.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:54:39.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:54:39.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:54:39.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:54:39.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:54:39.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:54:39.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:54:39.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:54:39.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:54:39.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:80:cb:2b:31:49:e9:b5:e5:3e:56:0e:2f:5c:0d:df:e8:22:0e:fd]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 06:57:38.470  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 06:57:38.473 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 06:57:38.476 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:57:38.477 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 06:57:38.477  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 06:57:38.478  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 06:57:38.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 06:57:38.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 06:57:38.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 06:57:38.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 06:57:38.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 06:57:38.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:57:38.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 06:57:38.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:57:38.709  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 06:57:38.710  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 06:57:38.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 06:57:38.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 06:57:38.712  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 06:57:38.713  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 06:57:38.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:57:38.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:57:38.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:57:38.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:57:38.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:57:38.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:57:38.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 06:57:38.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 06:57:38.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 06:57:38.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 06:57:38.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:70:d7:0d:25:be:c1:84:36:1b:1e:54:8d:88:a4:c2:50:42:5f:04]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:03:35.880  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:03:35.883 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:03:35.885 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:03:35.886 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:03:35.886  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:03:35.887  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:03:35.887  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:03:35.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:03:35.888 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:03:35.888 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:03:35.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:03:35.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:03:35.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:03:35.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:03:36.183  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:03:36.184  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:03:36.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:03:36.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:03:36.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:03:36.187  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:03:36.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:03:36.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:03:36.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:03:36.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:03:36.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:03:36.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:03:36.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:03:36.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:03:36.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:03:36.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:03:36.196 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: abf23ce92a0861f0d0465b14c9828eb467464739f370a1244582c8792518762edf88fb0c33002a09049fc6d1ded163602acc4567d61314770799b16419559aca09088366e8c1ccd4e102a5b6c9d68398b1561f9299ecada288e7275233541b64087df9d86db0c2af9495bad0be95b12624b5ce8b764976b42a4c491b2a81798162553f3d51214bc28585ed161bad4b10148633f28a313161ca64611d22b3c66090a251c009ff75f933c5e86661daeae0935a06bb27be5c53d482d8c7bb7b83a052d495f82970a6034ac9d6f50daa03d122576d2bfd6e86ae1ce9bde251e3fc554a188da516a72bdbd133347378f7f8d1514369e3a2c010a3cf57f87d209ae106ce028056c752c91ee040cb768d0002a539f9e4caaaa782d06f8f56559d8c161ab77105103e13b5381ec881c598d91b79e25d3c1c09d55c5e3038144af4dd68904c418ccef197cc85a47f46fd029bbc452c69b9affbeea0baee072abc34e8dafa62193267ba19115a5efd67ecf7082ef2490b1d77bf73b2b7d55f710f3fff1819
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:e7:7c:79:3e:7d:22:81:49:d5:e7:20:56:42:74:eb:13:49:ee:1a]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:07:24.305  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:07:24.308 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:07:24.313 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:07:24.316 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:07:24.317  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:07:24.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:07:24.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:07:24.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:07:24.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:07:24.320 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:07:24.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:07:24.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:07:24.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:07:24.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:07:24.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:07:24.639  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:07:24.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:07:24.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:07:24.641  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:07:24.642  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:07:24.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:24.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:24.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:24.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:24.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:24.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:24.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:24.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:24.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:24.647 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:07:24.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:f5:9f:d0:8d:2f:92:6f:02:8a:5c:66:c6:96:08:8c:58:f9:99:1b]
            modulus: b3d7a43756c66697c60c7d72c6bc61808719a9dd5666a60b15d478e68e3fd76817cd635b8c26b6e90085628e4acddba917634a213e2a6f369cfff8dec68db84df350f368d088253f4e582f875f4076f3a8f9734a7bb4ed56e55013cdeed6b5944c299310571e47573a58f500445670d4724bcab23dc01713f33639debe04b5579e951205a007944ab09419cbc2c2e831bcbbb85df5c856ff28691f9a6b26850fc3441be5cb5765588bdfc32e4e3dc6fe8b023fd2760317eb647f7ec3748f8a769bee2fc936c05e04d55f0f403a68f619faf1ba14ed1ad1d9111ecf1473d7d4c7ccd056bf5ca58f135a3454ad36cd2ba3f13dc6c8348b46b771f422c991c619fb
    public exponent: 10001

] 
2022-04-25 07:07:31.737  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:07:31.738 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:07:31.740 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-25 07:07:31.740 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:07:31.741  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-25 07:07:31.741  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:07:31.742  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:07:31.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:07:31.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:07:31.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:07:31.751 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:07:31.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:07:31.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:07:31.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:07:31.914  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:07:31.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:07:31.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:07:31.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:07:31.922  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:07:31.923  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:07:31.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:31.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:31.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:31.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:31.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:31.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:31.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:31.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:31.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:31.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:07:31.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:33:cc:9e:8d:12:80:23:02:d7:d3:f4:f8:46:12:f2:3b:81:e3:62]
            modulus: edaea47c75846fc6757807bfb466537f99c2c27bb811a5d801493ae6a3d2d8615700bdaaf2d6f41dac295490756efa707730c141c8d6bf47fef8fa80492cd420ceace541c55b182d300af9cc4449946472f6963aadf0b0c433285634611223707233d86e7042f0af1f1f13d6d0ab8fd9d678b30893e30e8271487e95c354c5d3abd2d07bc79f575cbdc49ce89c2ece91d1913b699406f09b094d777aa31ed5aa1dd714844d5ebf947a8b55775170f74659836566018205ffcc97504d00c08a708f045216ff1408d9030f56394ce9fd40f87dfba26d446dbe13b1e129e72e211ef11fb9f6c075b4c88ec19f09eea6f631c11484694c9daada1ef7140101588efb
    public exponent: 10001

] 
2022-04-25 07:07:38.724  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:07:38.725 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:07:38.726 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-25 07:07:38.727 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:07:38.727  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-25 07:07:38.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:07:38.729  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:07:38.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:07:38.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:07:38.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:07:38.734 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:07:38.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:07:38.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:07:38.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:07:38.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:07:38.953  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:07:38.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:07:38.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:07:38.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:07:38.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:07:38.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:38.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:38.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:38.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:38.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:38.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:38.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:07:38.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:07:38.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:07:38.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:07:38.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: abf23ce92a0861f0d0465b14c9828eb467464739f370a1244582c8792518762edf88fb0c33002a09049fc6d1ded163602acc4567d61314770799b16419559aca09088366e8c1ccd4e102a5b6c9d68398b1561f9299ecada288e7275233541b64087df9d86db0c2af9495bad0be95b12624b5ce8b764976b42a4c491b2a81798162553f3d51214bc28585ed161bad4b10148633f28a313161ca64611d22b3c66090a251c009ff75f933c5e86661daeae0935a06bb27be5c53d482d8c7bb7b83a052d495f82970a6034ac9d6f50daa03d122576d2bfd6e86ae1ce9bde251e3fc554a188da516a72bdbd133347378f7f8d1514369e3a2c010a3cf57f87d209ae106ce028056c752c91ee040cb768d0002a539f9e4caaaa782d06f8f56559d8c161ab77105103e13b5381ec881c598d91b79e25d3c1c09d55c5e3038144af4dd68904c418ccef197cc85a47f46fd029bbc452c69b9affbeea0baee072abc34e8dafa62193267ba19115a5efd67ecf7082ef2490b1d77bf73b2b7d55f710f3fff1819
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:cd:37:c3:50:13:a2:35:3a:90:5f:29:01:56:81:05:c2:85:77:7f]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:13:16.299  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:13:16.303 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:13:16.307 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:13:16.312 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:13:16.313  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:13:16.314  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:13:16.314  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:13:16.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:13:16.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:13:16.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:13:16.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:13:16.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:13:16.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:13:16.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:13:16.564  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:13:16.565  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:13:16.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:13:16.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:13:16.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:13:16.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:13:16.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:13:16.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:13:16.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:13:16.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:13:16.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:13:16.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:13:16.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:13:16.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:13:16.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:13:16.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:13:16.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:0d:aa:29:b7:8f:e8:4f:a8:1a:19:ee:87:b6:5a:ba:a3:26:a6:2a]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:17:01.584  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:17:01.587 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:17:01.594 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:17:01.596 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:17:01.600  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:17:01.606  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:17:01.607  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:17:01.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:17:01.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:17:01.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:17:01.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:17:01.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:17:01.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:17:01.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:17:02.076  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:17:02.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:17:02.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:17:02.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:17:02.081  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:17:02.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:17:02.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:17:02.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:17:02.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:17:02.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:17:02.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:17:02.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:17:02.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:17:02.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:17:02.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:17:02.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:17:02.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:59:c5:f2:ce:20:a5:a8:bb:2b:0f:22:24:86:f0:98:0b:e1:24:09]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:21:10.077  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:21:10.080 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:21:10.082 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:21:10.084 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:21:10.084  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:21:10.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:21:10.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:21:10.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:21:10.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:21:10.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:21:10.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:21:10.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:21:10.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:21:10.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:21:10.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:21:10.311  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:21:10.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:21:10.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:21:10.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:21:10.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:21:10.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:21:10.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:21:10.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:21:10.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:21:10.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:21:10.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:21:10.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:21:10.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:21:10.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:21:10.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:21:10.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:5f:f4:f1:e7:45:d7:fa:c9:92:ae:7c:c0:9f:1b:2a:c1:69:6f:a8]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:25:04.723  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:25:04.725 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:25:04.727 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:25:04.728 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:25:04.728  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:25:04.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:25:04.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:25:04.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:25:04.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:25:04.731 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:25:04.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:25:04.737 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:25:04.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:25:04.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:25:05.004  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:25:05.005  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:25:05.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:25:05.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:25:05.008  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:25:05.009  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:25:05.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:25:05.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:25:05.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:25:05.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:25:05.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:25:05.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:25:05.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:25:05.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:25:05.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:25:05.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:25:05.019 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:ac:1e:4a:56:ce:c2:b8:cd:42:e1:a5:90:97:ea:72:60:ea:77:c0]
            modulus: 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
    public exponent: 10001

] 
2022-04-25 07:29:52.597  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-25 07:29:52.600 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-25 07:29:52.603 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:29:52.605 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-25 07:29:52.606  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-25 07:29:52.606  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-25 07:29:52.607  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-25 07:29:52.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-25 07:29:52.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-25 07:29:52.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-25 07:29:52.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-25 07:29:52.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:29:52.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-25 07:29:52.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:29:52.867  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-25 07:29:52.869  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-25 07:29:52.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-25 07:29:52.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-25 07:29:52.871  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-25 07:29:52.872  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-25 07:29:52.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:29:52.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:29:52.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:29:52.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:29:52.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:29:52.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:29:52.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-25 07:29:52.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-25 07:29:52.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-25 07:29:52.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-25 07:29:52.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576914969045236237364910275858056656668078476010
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 25 05:11:05 UTC 2022
           Final Date: Sat Apr 24 05:11:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [07:5d:70:96:36:31:00:c1:cf:0d:d4:c2:9c:e3:17:5c:99:a4:4c:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b8f159b58f80b4f3e11144f75c65e82bb93b880
                       f73e812c6a6b2c6e97bdb2143c90bec56641bb19
                       e3f32d7a0a10d668196945947ae4316f75f48b40
                       ab800b1d21197fcbb35b9a5d143cfa346d9a5d68
                       8b0e94587ddc7d66bcb3b4859bb356cf0da0f2d9
                       d434a61b0c18048c25503006977a73cc5d8b8c9b
                       73df30690c91806f2382ed3cb4f757f9ecf03db6
                       5ed3e96e0b6af359661b8f397113469f5ec6e2a6
                       4e504c7f2813c303ca67e563ca4ebba359c2a6bc
                       bd966c47f1af9dd82f16cb4bd3eb6e6fac659a17
                       7cf94132ffbb837a184caaf12744f5aadb799a9e
                       ec5b4e7ba0e9fe0561bcf3fadc582e68eb56ce53
                       1951f3b3bc05c247d6acc4319f7c9759aa800236
                       5452645462c22282c72a84939841ad7952429b0d
                       7c3cff1dc080fa3a2c37a159df9bcb9c2aa2c794
                       b1eb26ba100e42edfbd14e5d6fd2a3a4beda0b45
                       7dcea58063be46a60b46023de187b2d1e4c2e20a
                       b77861d01b02725cca7acf34112e70b70fb1546e
                       79a195f60d56928f329cb120191d975661daca43
                       bcc939ae
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:06:51:8a:e5:9b:df:d4:6c:d1:64:eb:4a:76:97:54:ec:e0:47:7b]
            modulus: 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
    public exponent: 10001

]