Results

By type

          2022-05-01 05:07:52,513 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-01 05:07:53,649 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-01 05:07:54.632  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 01, 2022 5:07:56 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 01, 2022 5:07:56 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 01, 2022 5:07:56 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 01, 2022 5:07:56 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-01 05:07:57.279 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-01 05:07:57.567  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-01 05:07:57.739  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-01 05:07:58.478 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-01 05:07:58.482 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-01 05:07:58.483 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-01 05:07:58.487 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-01 05:07:58.539 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-01 05:07:58.545 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-01 05:07:58.691 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-01 05:07:59.358 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 01, 2022 5:08:00 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-01 05:08:00.430  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.886 seconds (JVM running for 10.968)
May 01, 2022 5:08:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-01 05:08:49.146  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 05:08:49.158 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 05:08:49.205 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-01 05:08:49.211 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 05:08:49.235  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-01 05:08:49.239  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 05:08:49.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 05:08:49.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 05:08:49.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 05:08:49.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 05:08:49.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 05:08:49.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 05:08:49.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 05:08:49.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 05:08:49.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 05:08:49.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 05:08:49.884  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 05:08:49.887  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 05:08:49.888 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 05:08:49.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 05:08:49.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 05:08:49.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 05:08:49.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 05:08:49.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 05:08:49.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 05:08:49.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 05:08:49.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 05:08:49.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 05:08:49.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 05:08:49.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 05:08:49.926 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 05:08:49.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 05:08:49.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:38:1e:0e:56:be:a9:8a:6e:00:58:aa:07:81:16:6e:b1:80:3a:e6]
            modulus: c0d90ea05d87a12b355f3181cc896dca3bf5baecc7f732f5b088109700b12736274bc4ad40a264be9d6d26b02b04140caf7365ea8499228d007a9fe42ba8e3f5736a31ed67d9427264e7ad778253019d6aa8e09fa7ee598ea6110e3ba4cc492b7bd55d8d2ac2b2330a1a6d217bd62ebd81566d81852e470c7eaa2136e7ef4f8b465b7f39b7c239f8fa796bf9ec3c5da2b5cf921bf68d6eeb9ba923b56826fb07a4e2c4796d38d81e0ba5dd783add05005958ca0fdd24cc6c4afc1c08670a79d11ba972319f9e4d4f55e336aa8913cec1ed57f10faa5237730c75a0217e30d53cafbf40838e6e71eecb4a7aac5ddbb3032f837c486bf68dcc38e00b15ca7e09fb
    public exponent: 10001

] 
2022-05-01 06:22:22.555  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:22:22.558 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:22:22.561 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-01 06:22:22.563 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:22:22.563  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-01 06:22:22.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:22:22.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:22:22.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:22:22.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:22:22.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:22:22.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:22:22.575 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:22:22.575 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:22:22.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:22:22.787  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:22:22.788  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:22:22.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:22:22.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:22:22.792  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:22:22.793  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:22:22.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:22:22.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:22:22.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:22:22.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:22:22.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:22:22.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:22:22.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:22:22.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:22:22.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:22:22.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:22:22.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:a4:4c:cf:40:90:30:df:a4:42:4d:04:36:2b:cb:fe:53:e3:ad:37]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:22:30.744  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:22:30.745 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:22:30.747 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:22:30.747 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:22:30.748  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:22:30.748  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:22:30.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:22:30.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:22:30.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:22:30.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:22:30.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:22:30.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:22:30.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:22:30.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:22:30.878  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:22:30.878  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:22:30.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:22:30.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:22:30.887  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:22:30.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:22:30.888 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:22:30.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:22:30.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:22:30.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:22:30.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:22:30.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:22:30.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:22:30.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:22:30.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:22:30.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:22:30.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:15:6b:33:35:30:0e:8d:b3:07:24:98:da:71:d8:53:6a:2d:87:75]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:24:18.819  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:24:18.821 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:24:18.827 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-01 06:24:18.829 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:24:18.835  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-01 06:24:18.837  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:24:18.838  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:24:18.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:24:18.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:24:18.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:24:18.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:24:18.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:24:18.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:24:18.849 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:24:18.992  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:24:18.993  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:24:18.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:24:18.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:24:18.996  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:24:18.997  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:24:18.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:24:18.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:24:18.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:24:19.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:24:19.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:24:19.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:24:19.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:24:19.003 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:24:19.003 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:24:19.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:24:19.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:51:d2:26:04:a6:b4:56:34:f9:f9:6e:e9:3e:e1:33:b1:84:7f:21]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:25:28.251  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:25:28.253 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:25:28.255 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-01 06:25:28.255 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:25:28.256  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-01 06:25:28.257  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:25:28.257  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:25:28.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:25:28.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:25:28.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:25:28.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:25:28.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:25:28.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:25:28.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:25:28.408  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:25:28.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:25:28.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:25:28.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:25:28.412  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:25:28.413  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:25:28.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:25:28.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:25:28.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:25:28.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:25:28.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:25:28.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:25:28.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:25:28.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:25:28.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:25:28.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:25:28.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:71:33:15:28:14:a6:37:4d:00:03:7b:55:47:61:39:79:05:b3:ac]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:27:26.748  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:27:26.750 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:27:26.753 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-01 06:27:26.753 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:27:26.754  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-01 06:27:26.754  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:27:26.755  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:27:26.755 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:27:26.755 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:27:26.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:27:26.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:27:26.762 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:27:26.762 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:27:26.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:27:26.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:27:26.913  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:27:26.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:27:26.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:27:26.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:27:26.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:27:26.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:26.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:26.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:26.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:26.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:26.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:26.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:26.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:26.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:26.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:27:26.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:03:ea:7a:33:21:3a:19:82:2c:30:84:58:7b:b0:04:87:69:a7:13]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:27:27.791  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:27:27.792 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:27:27.804 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:27:27.805 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:27:27.805  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:27:27.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:27:27.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:27:27.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:27:27.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:27:27.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:27:27.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:27:27.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:27:27.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:27:27.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:27:27.904  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:27:27.905  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:27:27.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:27:27.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:27:27.909  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:27:27.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:27:27.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:27.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:27.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:27.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:27.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:27.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:27.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:27.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:27.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:27.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:27:27.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: aee468c447c8f8546764033396dd93af15bed8343e7a9778bfd2a3e63b8435a262fcaef09474b9552473b6ab522e3fb3d090eb04100b42c9c24e9b18543e62f422689d73db148f2ae5a2ce1654afad5b4b81037b2f177b5a90c4e4b24360ca7c44ef2bae733deb9de878c8720bfdaee76da0760df9262b743bdb2d0d86a083cab88d46dc17d20131fa816f887250bb671f41c4f9877fec63f8b2d22d6a353be0aac41d4f507c84be528a1aea166422a90a9aaf9262e0021cf2bb974da865f332d4edc6b1e19fbe7c5f2b451cf4c7f355b94785ae546d7191d9750a0b8b0c57dd4d545443fc179d13763ce87ff92e6b889201ebb6b8f2659170ad31ad5e8c8be04e6bd035574735af775d5bb6e56e3a9b6dc2717a16f12444faa57a88f4c14170c3fbdcd03172de4aa2a0eddb5e7fa687a2ac1de35423492741b94472af62bda72bcfc045f8e95c3ac3e9b978710f2322012e41ff7b02c2c5083ba6761953f34ffa2688c5c1bd2e7ef629091d7cbacbc642d15f84d6353ab18f6263e856cb3559
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:59:d7:b6:d4:8c:b5:69:2e:bc:f8:f3:55:4a:e4:02:6b:f3:05:bb]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:27:41.727  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:27:41.728 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:27:41.730 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-01 06:27:41.731 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:27:41.732  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-01 06:27:41.734  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:27:41.735  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:27:41.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:27:41.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:27:41.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:27:41.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:27:41.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:27:41.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:27:41.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:27:41.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:27:41.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:27:41.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:27:41.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:27:41.868  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:27:41.868  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:27:41.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:41.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:41.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:41.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:41.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:41.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:41.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:27:41.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:27:41.873 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:27:41.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:27:41.878 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: aee468c447c8f8546764033396dd93af15bed8343e7a9778bfd2a3e63b8435a262fcaef09474b9552473b6ab522e3fb3d090eb04100b42c9c24e9b18543e62f422689d73db148f2ae5a2ce1654afad5b4b81037b2f177b5a90c4e4b24360ca7c44ef2bae733deb9de878c8720bfdaee76da0760df9262b743bdb2d0d86a083cab88d46dc17d20131fa816f887250bb671f41c4f9877fec63f8b2d22d6a353be0aac41d4f507c84be528a1aea166422a90a9aaf9262e0021cf2bb974da865f332d4edc6b1e19fbe7c5f2b451cf4c7f355b94785ae546d7191d9750a0b8b0c57dd4d545443fc179d13763ce87ff92e6b889201ebb6b8f2659170ad31ad5e8c8be04e6bd035574735af775d5bb6e56e3a9b6dc2717a16f12444faa57a88f4c14170c3fbdcd03172de4aa2a0eddb5e7fa687a2ac1de35423492741b94472af62bda72bcfc045f8e95c3ac3e9b978710f2322012e41ff7b02c2c5083ba6761953f34ffa2688c5c1bd2e7ef629091d7cbacbc642d15f84d6353ab18f6263e856cb3559
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:a3:d8:98:eb:41:14:3c:3d:5e:0a:17:67:72:64:ba:b4:14:8f:8b]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:31:29.542  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:31:29.544 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:31:29.552 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:31:29.553 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:31:29.554  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:31:29.554  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:31:29.555  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:31:29.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:31:29.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:31:29.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:31:29.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:31:29.568 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:31:29.568 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:31:29.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:31:29.732  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:31:29.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:31:29.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:31:29.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:31:29.739  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:31:29.740  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:31:29.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:31:29.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:31:29.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:31:29.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:31:29.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:31:29.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:31:29.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:31:29.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:31:29.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:31:29.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:31:29.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:37:32:82:eb:05:72:c2:ae:15:bb:98:44:fa:5f:a4:aa:cd:fe:6e]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:36:52.842  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:36:52.844 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:36:52.847 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:36:52.848 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:36:52.849  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:36:52.850  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:36:52.851  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:36:52.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:36:52.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:36:52.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:36:52.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:36:52.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:36:52.859 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:36:52.859 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:36:52.980  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:36:52.981  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:36:52.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:36:52.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:36:52.983  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:36:52.984  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:36:52.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:36:52.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:36:52.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:36:52.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:36:52.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:36:52.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:36:52.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:36:52.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:36:52.988 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:36:52.989 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:36:52.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [19:fd:99:88:20:1b:69:6b:2f:7a:da:68:40:50:1f:b0:13:0b:d2:cf]
            modulus: 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
    public exponent: 10001

] 
2022-05-01 06:40:53.210  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-01 06:40:53.213 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-01 06:40:53.215 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:40:53.216 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-01 06:40:53.217  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-01 06:40:53.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-01 06:40:53.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-01 06:40:53.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-01 06:40:53.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-01 06:40:53.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-01 06:40:53.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-01 06:40:53.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:40:53.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-01 06:40:53.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:40:53.369  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-01 06:40:53.370  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-01 06:40:53.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-01 06:40:53.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-01 06:40:53.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-01 06:40:53.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-01 06:40:53.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:40:53.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:40:53.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:40:53.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:40:53.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:40:53.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:40:53.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-01 06:40:53.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-01 06:40:53.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-01 06:40:53.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-01 06:40:53.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 443733209754343975388650041048398382699624146246
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 01 05:04:51 UTC 2022
           Final Date: Fri Apr 30 05:04:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e2:a8:82:5a:91:99:b0:4d:c9:9b:80:ff:25:89:73:41:55:0b:aa:ba]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0e7bc18af37fca23fc9c2c47c1e745f2807859a6
                       4cc2f5b489feede619137c31e0eef0e6e4cab43f
                       28095095a6e7fda30bb3502fada41e89495692f7
                       75d0cb90f41b493165392e67b5f99bebf882b9e8
                       a7175a2ffd3db418025980124f977c92bde5c6ee
                       da058514d88441cddc762b3baf023e97de061ced
                       5d8c5fd71c89e0bae9e4a5d82431ef7ab80c4b0a
                       5461afe48c650df937d6b953c40b230a0e7f0c28
                       6bcbf2280983ca24e8cb7b9a8335725d4740c0d1
                       45d59a2db058508bf4a2da48f24b847931eab4fe
                       74e5d936fb5360ea5f6fb5a8dea0aef2976ed57e
                       fcb9f69e5b3098f79f75e529e1bc8caca00d4fbb
                       dff6fa17003ac96b82b3d3ffd454661cedc10d30
                       8ade342b8cb76b5a5e3de40dc370adaaef4f9ff0
                       f44bdb577144e879f874296df72d3edc33dabd06
                       0be9036928d8b904948bf4a45c085081c3355933
                       2a4d2436770fd8b8dc0441e3208024f4c0e8b734
                       b8f12a0a8c8c60f44ca9a37c8bbda8aa18523929
                       628ff4012d6737037cccd4f6a2641b711376264f
                       7df40ac6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:99:28:58:f9:76:5e:77:c3:b0:bb:b7:d7:62:16:d7:dd:27:7a:c8]
            modulus: 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
    public exponent: 10001

]