Results

By type

          2022-05-15 05:01:01,361 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-15 05:01:02,110 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-15 05:01:02.778  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 15, 2022 5:01:04 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 15, 2022 5:01:04 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 15, 2022 5:01:04 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 15, 2022 5:01:05 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-15 05:01:05.518 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-15 05:01:05.792  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-15 05:01:05.979  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-15 05:01:06.729 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-15 05:01:06.732 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-15 05:01:06.733 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-15 05:01:06.737 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-15 05:01:06.771 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-05-15 05:01:06.774 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-15 05:01:06.885 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-15 05:01:07.574 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 15, 2022 5:01:08 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-15 05:01:08.395  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.702 seconds (JVM running for 9.344)
May 15, 2022 5:01:29 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-15 05:01:45.095  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 05:01:45.105 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 05:01:45.151 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-15 05:01:45.159 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 05:01:45.179  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-15 05:01:45.182  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 05:01:45.183  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 05:01:45.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 05:01:45.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 05:01:45.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 05:01:45.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 05:01:45.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 05:01:45.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 05:01:45.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 05:01:45.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 05:01:45.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 05:01:45.730  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 05:01:45.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 05:01:45.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 05:01:45.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 05:01:45.743  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 05:01:45.745  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 05:01:45.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 05:01:45.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 05:01:45.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 05:01:45.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 05:01:45.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 05:01:45.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 05:01:45.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 05:01:45.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 05:01:45.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 05:01:45.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 05:01:45.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:6d:14:55:9f:27:ec:dc:8c:1c:ca:05:32:b4:b7:16:e2:b8:b8:d6]
            modulus: b12e79fc7cc1b5d90f08841527593431121b53826740bd992d529e83aea5b0f72a8e27ec33f84533c647ab246721c96254967c8798e10c2ca14946d34f6886af969a5af1e3d2bb8d7c08757b209bb76a8076ff2340161b5001fa2d4717664cf2ca91dd07103176023278011f9dbf72594089b77c7ffeb0d6ce0f31cc8c13d33eed66ce2ad3041f621603ff7216cbf5cfd8b8113851b76740797f5fdf96641d96b4efba7f4b1f053478749425f0f2357c8690b13372862f1f6cc62500f3e37dfba91e9c2ff45b120a05ed1815e57a1ce4bc2d1163a079966b96b7307503bf7413fa4d7a6fe068b6c6348051f02002f342c64ecaea370dcd2773c9c26244713f9b
    public exponent: 10001

] 
2022-05-15 06:11:30.046  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:11:30.050 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:11:30.053 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:11:30.055 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:11:30.055  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:11:30.056  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:11:30.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:11:30.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:11:30.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:11:30.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:11:30.069 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:11:30.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:11:30.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:11:30.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:11:30.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:11:30.210  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:11:30.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:11:30.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:11:30.215  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:11:30.216  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:11:30.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:11:30.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:11:30.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:11:30.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:11:30.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:11:30.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:11:30.221 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:11:30.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:11:30.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:11:30.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:11:30.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:15:82:4c:e0:20:2c:70:d9:76:b9:db:3c:89:29:7d:62:97:2d:75]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:11:53.082  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:11:53.083 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:11:53.085 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-15 06:11:53.086 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:11:53.087  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-15 06:11:53.088  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:11:53.089  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:11:53.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:11:53.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:11:53.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:11:53.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:11:53.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:11:53.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:11:53.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:11:53.193  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:11:53.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:11:53.194 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:11:53.195 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:11:53.197  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:11:53.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:11:53.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:11:53.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:11:53.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:11:53.201 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:11:53.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:11:53.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:11:53.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:11:53.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:11:53.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:11:53.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:11:53.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:96:4c:3b:88:47:03:bb:e1:e9:4b:eb:b6:02:3b:43:db:83:ee:53]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:13:01.853  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:13:01.856 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:13:01.860 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-15 06:13:01.861 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:13:01.863  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-15 06:13:01.865  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:13:01.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:13:01.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:13:01.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:13:01.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:13:01.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:13:01.879 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:13:01.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:13:01.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:13:01.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:13:01.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:13:01.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:13:01.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:13:01.998  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:13:01.999  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:13:02.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:13:02.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:13:02.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:13:02.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:13:02.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:13:02.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:13:02.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:13:02.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:13:02.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:13:02.005 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:13:02.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: d57fd0c4016259d6d53f6a82ce5e6dfcb3e3b09e9e6e23ac147f5daacd03225d1f6e10477f2849c034e46982953dce92a84380f8022d3352f92c2de33fc6a852c193ae0b2adc14739bf759f6bf1c45b1fd2e6a8410ea37d048ab0f1c0f02538a7fea6f1f4b776c63583a10374ad4a96fd19bd15f1fd58f144c74ec62900a5f232715fb7df4d51562f11ce9f682bf8fb8e80ae25ae86328003504078c05fb6cbde53ea79194b1fa3adb4d7ef0211dbea355e5f336f75dd24c4ed37e9d171542d95f1984a48e217f7a5379fed39f15cee96b70eb77744098594f8f4b855a92d0ad25b269c0980ecb2f4996b2c8672a1da464b4a2c358f5992f11acbb281c32635ed2e94210643be19b3c77ded6aee3be2173b169bf4c847a48db9f6779175b11b54426da8e418b6b229c2d394d8a55ff7651ee60478ac7708fe3324047f8e8ce69591c7176fb6bec62e30bc9bf3e5bac72de56c2422b342d594979b6bda4c8b14c5ec9f0e5ac0b8481a9e3320689ef3abe32a7242280f60151b38dfa951907edb9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:d4:3d:7a:10:78:fb:7a:da:92:bc:49:ec:c6:db:4e:a5:cb:a3:62]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:14:11.908  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:14:11.913 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:14:11.916 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-15 06:14:11.917 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:14:11.918  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-15 06:14:11.919  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:14:11.919  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:14:11.920 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:14:11.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:14:11.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:14:11.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:14:11.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:14:11.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:14:11.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:14:12.051  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:14:12.053  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:14:12.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:14:12.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:14:12.058  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:14:12.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:14:12.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:14:12.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:14:12.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:14:12.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:14:12.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:14:12.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:14:12.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:14:12.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:14:12.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:14:12.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:14:12.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:8b:b9:3f:32:ac:6d:48:3d:a6:7e:1e:9a:15:ab:1e:eb:fa:dc:56]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:16:07.637  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:16:07.638 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:16:07.640 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:16:07.640 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:16:07.641  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:16:07.641  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:16:07.642  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:16:07.642 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:16:07.642 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:16:07.643 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:16:07.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:16:07.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:16:07.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:16:07.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:16:07.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:16:07.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:16:07.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:16:07.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:16:07.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:16:07.756  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:16:07.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:16:07.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:16:07.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:16:07.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:16:07.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:16:07.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:16:07.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:16:07.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:16:07.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:16:07.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:16:07.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:e7:43:ab:d7:ae:71:14:f8:d6:27:b0:1b:f1:e7:49:07:6a:39:cb]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:16:47.795  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:16:47.796 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:16:47.798 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-15 06:16:47.798 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:16:47.799  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-15 06:16:47.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:16:47.800  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:16:47.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:16:47.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:16:47.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:16:47.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:16:47.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:16:47.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:16:47.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:16:47.894  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:16:47.894  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:16:47.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:16:47.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:16:47.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:16:47.897  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:16:47.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:16:47.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:16:47.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:16:47.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:16:47.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:16:47.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:16:47.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:16:47.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:16:47.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:16:47.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:16:47.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: d57fd0c4016259d6d53f6a82ce5e6dfcb3e3b09e9e6e23ac147f5daacd03225d1f6e10477f2849c034e46982953dce92a84380f8022d3352f92c2de33fc6a852c193ae0b2adc14739bf759f6bf1c45b1fd2e6a8410ea37d048ab0f1c0f02538a7fea6f1f4b776c63583a10374ad4a96fd19bd15f1fd58f144c74ec62900a5f232715fb7df4d51562f11ce9f682bf8fb8e80ae25ae86328003504078c05fb6cbde53ea79194b1fa3adb4d7ef0211dbea355e5f336f75dd24c4ed37e9d171542d95f1984a48e217f7a5379fed39f15cee96b70eb77744098594f8f4b855a92d0ad25b269c0980ecb2f4996b2c8672a1da464b4a2c358f5992f11acbb281c32635ed2e94210643be19b3c77ded6aee3be2173b169bf4c847a48db9f6779175b11b54426da8e418b6b229c2d394d8a55ff7651ee60478ac7708fe3324047f8e8ce69591c7176fb6bec62e30bc9bf3e5bac72de56c2422b342d594979b6bda4c8b14c5ec9f0e5ac0b8481a9e3320689ef3abe32a7242280f60151b38dfa951907edb9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:2f:4d:26:61:20:17:c0:72:62:69:5b:2f:77:dc:75:b8:fb:41:6c]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:17:04.535  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:17:04.536 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:17:04.538 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-15 06:17:04.538 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:17:04.539  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-15 06:17:04.539  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:17:04.539  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:17:04.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:17:04.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:17:04.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:17:04.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:17:04.545 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:17:04.545 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:17:04.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:17:04.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:17:04.660  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:17:04.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:17:04.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:17:04.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:17:04.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:17:04.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:17:04.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:17:04.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:17:04.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:17:04.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:17:04.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:17:04.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:17:04.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:17:04.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:17:04.666 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:17:04.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:9c:d0:aa:66:93:ac:b8:17:1a:26:24:ad:ac:20:f7:aa:f8:50:29]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:20:09.039  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:20:09.042 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:20:09.044 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:20:09.045 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:20:09.046  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:20:09.047  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:20:09.047  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:20:09.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:20:09.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:20:09.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:20:09.061 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:20:09.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:20:09.065 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:20:09.065 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:20:09.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:20:09.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:20:09.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:20:09.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:20:09.201  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:20:09.201  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:20:09.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:20:09.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:20:09.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:20:09.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:20:09.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:20:09.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:20:09.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:20:09.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:20:09.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:20:09.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:20:09.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:8a:3a:f3:db:83:d3:94:d0:3a:26:66:d1:50:46:ab:03:b6:7a:ba]
            modulus: cbe243a263bbd2fbe77301086e413b450298506bc6fe4ec9c45862d3072da0fb19b6e266632062e04e2f9ba65c814d414d5bdbc73474a2acb8bb8757ccf8d786451c632927054f51b559cd80f74e88a130c72a73a4050b96a17789216461cbae55ca36e414e003e4ead3cc94a48bdb77552962463bc245c4195bafb1226b1b08880e7bf639175e26c73755650c8b299259b3692b620eb122d3a23b4ead384c74a062d2257ca10dcb5d3de9ff2c328410f31356e362eb00fe877c235d9e1413ba15d2f9acf96a7e21abfb2c205b9bc42ffa4112ccca7cf9ec412afad6a66b793c81ea3ea2bd088261d887e1863de15a4d1a1764a8e0dc13776ed24ba59a9e49d3
    public exponent: 10001

] 
2022-05-15 06:25:00.423  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:25:00.433 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:25:00.435 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:25:00.438 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:25:00.438  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:25:00.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:25:00.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:25:00.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:25:00.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:25:00.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:25:00.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:25:00.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:25:00.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:25:00.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:25:00.596  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:25:00.597  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:25:00.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:25:00.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:25:00.599  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:25:00.599  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:25:00.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:25:00.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:25:00.600 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:25:00.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:25:00.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:25:00.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:25:00.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:25:00.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:25:00.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:25:00.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:25:00.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:60:5d:5b:29:ed:6b:dd:a0:2c:77:96:3a:20:0f:6e:21:85:70:ec]
            modulus: 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
    public exponent: 10001

] 
2022-05-15 06:29:26.653  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-15 06:29:26.654 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-15 06:29:26.656 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:29:26.657 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-15 06:29:26.657  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-15 06:29:26.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-15 06:29:26.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-15 06:29:26.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-15 06:29:26.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-15 06:29:26.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-15 06:29:26.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-15 06:29:26.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:29:26.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-15 06:29:26.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:29:26.765  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-15 06:29:26.765  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-15 06:29:26.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-15 06:29:26.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-15 06:29:26.767  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-15 06:29:26.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-15 06:29:26.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:29:26.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:29:26.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:29:26.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:29:26.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:29:26.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:29:26.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-15 06:29:26.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-15 06:29:26.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-15 06:29:26.778 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-15 06:29:26.786 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 112571254020371483838613497611074164198156605775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 15 04:59:26 UTC 2022
           Final Date: Fri May 14 04:59:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:43:5c:69:0d:35:c8:b1:ea:26:12:b5:32:97:77:45:73:85:b0:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d315d5d8a256942316680d236d1b5255413b1558
                       7f75848b729b9162e251e41bdef8f5821fb38949
                       0d733d38d5b778468f45abe056f202453b222cf0
                       e31df534c438ac13d44e14562ee055133637cc26
                       ad93ef17ae8c6f726f06e38e8c604dcdcaa25286
                       2b060a38ee053c58ece2ed958458d575ecf776e7
                       5083933b2bf6ba8a97c38b07d088a16bfc257ec9
                       9f819f3372a932ae122d9d0195522ec62e2a1fc2
                       be7d0e71eafa5b73832fabc2df11e894793ff3ea
                       131c824182a907c21345c42120571455f3a119f1
                       2fe21eeb422b099e21acc1228b06c00acfc6917c
                       6bf801c5a249e6a1e7868debed1af3d0f02d5c4a
                       9fec1bebb9f7b066c9c825053619b79104a04929
                       35ed91d9bd5e197a8eb58a9177242e4d78b02020
                       b80644f3873c2168451c1ad916b2a9d20c877c89
                       025860bfe54568053a571d1abc1b6d8ee29fe91b
                       537e75eac2b0f8c4c29551ed9733d603b110ef54
                       62191cfbd5da5bc71a7fb93a805da5ab9e305498
                       e07e7f5c1ec99cc6171719f66fb3a8ac1c6e24fe
                       d6d5e6ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:ad:02:72:eb:c8:8d:44:fd:78:ce:11:1c:2a:c0:9f:a3:53:0d:a8]
            modulus: d41460bf58b944b6d412cc90f1af668136cbac1fcbe23594adf8bee8c0ed465bf5ee24174329b982deb3ec96e77c9329753ea02af586c909a0ba27b8744ad9f15507e81070d7c6493486c9a8209802be7c4ffb012173913775f34153c7e18ff6ea97c25e5ba0fffce9889b8767db1dfee39af18219f12d1950e93e0edc910fda2b750a07f242615b48312217768a1bab53449a03844f3976ce4066e2bba5df255d7893f4ab9d5a27eadd91b8231c10137a9ad40241d9619e7ff5e14cfecd6ae95d1426ccc78d61f8f015a454746864f4e103f45058d7600756a35b55f6963bb4d37c678ffb502a5b80295362133ad802ad23e692fc1070f3df03afc63c3ed8c9
    public exponent: 10001

]