Results

By type

          2022-06-17 05:10:41,537 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-17 05:10:42,611 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-17 05:10:43.526  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 17, 2022 5:10:45 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 17, 2022 5:10:45 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 17, 2022 5:10:45 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 17, 2022 5:10:46 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-17 05:10:46.721 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-17 05:10:47.105  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-17 05:10:47.354  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-17 05:10:48.382 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-17 05:10:48.386 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-17 05:10:48.388 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-17 05:10:48.395 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-17 05:10:48.442 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-17 05:10:48.447 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-17 05:10:48.601 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-17 05:10:49.372 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 17, 2022 5:10:50 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-17 05:10:50.607  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.202 seconds (JVM running for 12.482)
Jun 17, 2022 5:11:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-17 05:11:26.229  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 05:11:26.242 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 05:11:26.309 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-17 05:11:26.316 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 05:11:26.346  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-17 05:11:26.351  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 05:11:26.353  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 05:11:26.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 05:11:26.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 05:11:26.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 05:11:26.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 05:11:26.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 05:11:26.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 05:11:26.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 05:11:26.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 05:11:26.447 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 05:11:27.097  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 05:11:27.101  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 05:11:27.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 05:11:27.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 05:11:27.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 05:11:27.123  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 05:11:27.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 05:11:27.133 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 05:11:27.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 05:11:27.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 05:11:27.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 05:11:27.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 05:11:27.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 05:11:27.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 05:11:27.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 05:11:27.180 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 05:11:27.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:49:ab:be:0e:de:37:7d:03:8c:89:1b:c6:a5:24:68:85:36:9f:2c]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 06:41:20.869  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:41:20.873 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:41:20.914 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:41:20.917 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:41:20.918  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:41:20.920  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:41:20.921  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:41:20.922 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:41:20.922 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:41:20.925 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:41:20.937 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:41:20.938 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:41:20.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:41:20.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:41:21.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:41:21.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:41:21.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:41:21.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:41:21.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:41:21.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:41:21.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:41:21.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:41:21.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:41:21.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:41:21.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:41:21.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:41:21.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:41:21.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:41:21.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:41:21.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:41:21.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: c13db991ae3b29472c1d9baf20fc2b35c6e29e641e9a4a31cfa904ac78118089f8736eb249b5ee561c242d66d929151643848b61537d74da11f094d9a07d4b07d6917670f7ab80c3770c63da1539d5b56452a5667999b32bf0460eb313b3770d4de90ca5e6510227384ba7c7d2d7aff93749f5bec4c44a4048b59cbd8ab6373a2b6979511e4e0d01a94b71d5e46520be1a294a923f312f91b6cb3da3956ede7a7edeb32e0b9b6c6fc4af4bbc5a431eed1f907c380745097001ac64db1b4c3fd691da55af5785e5426e27c5cdf3e5e078b3d44fc97be9c83d548ea2f83e1ec7c147ac36b814376c6d312c1dd4510547c83ff0baa59ce8d19c924054b9ed6a0de19ae36a8e73e68d396a87d0ae99cb2743fef122cdb0748772dff28bc1d137f7c0a08abbbf85455146fb955ccb18e71595b0b663e7283d2b1be2bc3314db9dff327d7158debb95498681ba49b21a793c2e495be1e5d8194e188a0a7a6fb11f8b2fa15930deaf29469c991bbb75c4a14f3a62dac6d4167cf4ef1bb11b5c04dc843d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:57:b4:44:84:69:40:0e:8c:7f:e5:4c:af:77:e7:7f:65:b6:7b:76]
            modulus: a2011a87a2c78b9c0eddae538c680681d9937e09da1812d9862af425ab625efb30c171495a37270a2bf2e4bd98b4d00be6579a257ad56ebf22fe425dd4e8b17ff973ee30345b0676eae2aa53f40a58d28478521a95e5b6962e0b65e088075cb326d6391eb43c452ed56c34baf8376172905f3393e7eb86de3eae4cd2863c3eb88f2fb28ad4e000dd4dfc994bdbd42a792ee3eb7a1de084912ddbb593ba2f12df7037796a5fd3a16259ad4b761d3491dde15c48a2ec0cd169c97acc29d560078e6f8c097cdb07c26088a271846dc9411de9562e631b50a0b2c882ccac57904a5d938a38fd88688f2348b8861ef6b393d361d0761b80d53957338e60d3275dc98d
    public exponent: 10001

] 
2022-06-17 06:44:12.808  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:44:12.809 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:44:12.811 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:44:12.813 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:44:12.813  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:44:12.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:44:12.816  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:44:12.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:44:12.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:44:12.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:44:12.827 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:44:12.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:44:12.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:44:12.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:44:12.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:44:12.981  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:44:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:44:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:44:12.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:44:12.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:44:12.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:44:12.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:44:12.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:44:12.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:44:12.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:44:12.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:44:13.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:44:13.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:44:13.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:44:13.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:44:13.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:bc:ab:80:ee:9a:c4:81:8b:51:e0:7f:2a:6c:f4:ce:90:7c:11:3a]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 06:45:29.049  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:45:29.051 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:45:29.056 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-17 06:45:29.057 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:45:29.058  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-17 06:45:29.077  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:45:29.078  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:45:29.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:45:29.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:45:29.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:45:29.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:45:29.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:45:29.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:45:29.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:45:29.297  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:45:29.298  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:45:29.298 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:45:29.299 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:45:29.301  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:45:29.301  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:45:29.302 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:45:29.303 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:45:29.303 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:45:29.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:45:29.305 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:45:29.305 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:45:29.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:45:29.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:45:29.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:45:29.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:45:29.315 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:21:3d:aa:e5:27:b6:f1:b6:cd:3b:3a:f0:fe:c6:bc:96:4a:36:d4]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 06:46:46.859  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:46:46.862 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:46:46.867 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-17 06:46:46.869 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:46:46.869  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-17 06:46:46.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:46:46.880  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:46:46.883 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:46:46.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:46:46.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:46:46.904 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:46:46.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:46:46.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:46:46.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:46:47.120  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:46:47.121  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:46:47.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:46:47.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:46:47.124  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:46:47.125  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:46:47.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:46:47.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:46:47.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:46:47.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:46:47.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:46:47.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:46:47.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:46:47.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:46:47.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:46:47.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:46:47.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:ee:9b:38:25:09:72:59:42:ff:f3:c5:53:29:f2:54:10:5a:d2:19]
            modulus: dc92d3cfb2c2cf2e64c42c983df54343c1f077f2e9937c6e0d76ca6e39cd3015c3d1d7525c8ff466ce15497d4901044c3bf78b1bc46f647ca0e8ce06be9e4e8e9f0929cc76ef640fc1687a543d4c259c7342690d0a9579b76630801016d6c8dd5d9dfda71ef69f4d34ad62f4ca5128149aea05599b336a46d9cb56649c40166fe538680afcfbf2c2c00f4d1864860d46afae4a48e2365a93310c667b8644cf76014205f2f77a3b299dcabe9b568e7bf6d3f638430301acbfe1022fc86571fd5ab84213f831bde50ea8ab237e9490c0d52b157ac313533a0bd9d81f9f06bf9f0249452e63281448cab6c9a281c3618dd4c4032c63093dc5eddefa57ddef51ce2b
    public exponent: 10001

] 
2022-06-17 06:50:31.088  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:50:31.091 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:50:31.094 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:50:31.095 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:50:31.097  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:50:31.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:50:31.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:50:31.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:50:31.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:50:31.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:50:31.107 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:50:31.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:50:31.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:50:31.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:50:31.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:50:31.253  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:50:31.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:50:31.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:50:31.256  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:50:31.257  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:50:31.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:50:31.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:50:31.259 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:50:31.260 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:50:31.260 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:50:31.260 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:50:31.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:50:31.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:50:31.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:50:31.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:50:31.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:c1:07:a5:ce:6c:f8:78:f6:0f:87:73:2e:3c:63:fe:60:64:20:be]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 06:55:17.720  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:55:17.727 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:55:17.730 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:55:17.730 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:55:17.731  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:55:17.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:55:17.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:55:17.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:55:17.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:55:17.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:55:17.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:55:17.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:55:17.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:55:17.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:55:17.913  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:55:17.914  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:55:17.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:55:17.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:55:17.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:55:17.930  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:55:17.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:55:17.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:55:17.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:55:17.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:55:17.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:55:17.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:55:17.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:55:17.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:55:17.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:55:17.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:55:17.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:da:56:69:e5:d1:f0:76:81:8f:74:4a:0d:b5:a4:26:b1:ed:fd:4e]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 06:57:42.317  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:57:42.321 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:57:42.325 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-17 06:57:42.329 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:57:42.330  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-17 06:57:42.330  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:57:42.331  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:57:42.331 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:57:42.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:57:42.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:57:42.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:57:42.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:57:42.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:57:42.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:57:42.517  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:57:42.518  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:57:42.518 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:57:42.518 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:57:42.521  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:57:42.521  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:57:42.522 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:57:42.522 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:57:42.523 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:57:42.524 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:57:42.525 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:57:42.525 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:57:42.526 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:57:42.527 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:57:42.527 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:57:42.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:57:42.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:e4:c0:8d:cf:f5:eb:7d:dc:38:71:be:db:2f:f1:8f:6f:79:6a:25]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 06:59:16.924  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 06:59:16.925 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 06:59:16.927 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:59:16.928 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 06:59:16.929  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 06:59:16.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 06:59:16.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 06:59:16.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 06:59:16.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 06:59:16.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 06:59:16.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 06:59:16.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:59:16.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 06:59:16.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:59:17.052  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 06:59:17.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 06:59:17.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 06:59:17.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 06:59:17.065  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 06:59:17.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 06:59:17.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:59:17.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:59:17.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:59:17.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:59:17.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:59:17.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:59:17.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 06:59:17.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 06:59:17.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 06:59:17.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 06:59:17.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: c13db991ae3b29472c1d9baf20fc2b35c6e29e641e9a4a31cfa904ac78118089f8736eb249b5ee561c242d66d929151643848b61537d74da11f094d9a07d4b07d6917670f7ab80c3770c63da1539d5b56452a5667999b32bf0460eb313b3770d4de90ca5e6510227384ba7c7d2d7aff93749f5bec4c44a4048b59cbd8ab6373a2b6979511e4e0d01a94b71d5e46520be1a294a923f312f91b6cb3da3956ede7a7edeb32e0b9b6c6fc4af4bbc5a431eed1f907c380745097001ac64db1b4c3fd691da55af5785e5426e27c5cdf3e5e078b3d44fc97be9c83d548ea2f83e1ec7c147ac36b814376c6d312c1dd4510547c83ff0baa59ce8d19c924054b9ed6a0de19ae36a8e73e68d396a87d0ae99cb2743fef122cdb0748772dff28bc1d137f7c0a08abbbf85455146fb955ccb18e71595b0b663e7283d2b1be2bc3314db9dff327d7158debb95498681ba49b21a793c2e495be1e5d8194e188a0a7a6fb11f8b2fa15930deaf29469c991bbb75c4a14f3a62dac6d4167cf4ef1bb11b5c04dc843d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:06:0b:b3:91:98:f5:b3:42:cd:b7:81:95:39:03:62:7a:fb:5a:1e]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 07:03:58.052  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:03:58.077 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:03:58.087 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-17 07:03:58.097 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:03:58.102  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-17 07:03:58.108  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:03:58.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:03:58.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:03:58.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:03:58.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:03:58.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:03:58.127 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:03:58.127 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:03:58.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:03:58.285  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:03:58.288  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:03:58.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:03:58.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:03:58.292  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:03:58.293  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:03:58.294 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:03:58.295 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:03:58.296 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:03:58.297 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:03:58.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:03:58.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:03:58.299 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:03:58.300 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:03:58.300 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:03:58.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:03:58.307 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:b7:5e:08:88:87:6f:51:9d:15:c3:e3:28:08:f4:01:4f:47:75:fd]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 07:04:19.435  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:04:19.437 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:04:19.442 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-17 07:04:19.443 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:04:19.456  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-17 07:04:19.457  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:04:19.457  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:04:19.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:04:19.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:04:19.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:04:19.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:04:19.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:04:19.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:04:19.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:04:19.658  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:04:19.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:04:19.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:04:19.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:04:19.662  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:04:19.663  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:04:19.664 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:04:19.664 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:04:19.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:04:19.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:04:19.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:04:19.667 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:04:19.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:04:19.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:04:19.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:04:19.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:04:19.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:d9:b2:ce:72:32:30:e5:0c:2d:97:47:86:25:72:ce:c4:27:af:dd]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 07:04:47.741  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:04:47.742 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:04:47.745 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:04:47.746 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:04:47.747  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:04:47.748  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:04:47.749  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:04:47.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:04:47.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:04:47.751 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:04:47.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:04:47.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:04:47.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:04:47.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:04:47.918  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:04:47.919  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:04:47.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:04:47.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:04:47.924  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:04:47.924  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:04:47.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:04:47.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:04:47.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:04:47.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:04:47.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:04:47.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:04:47.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:04:47.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:04:47.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:04:47.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:04:47.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:6e:31:c8:c6:4e:05:e1:d7:15:dc:55:e1:dc:12:0c:48:b4:85:43]
            modulus: b3566ca7a4c3b78568811bf86b28166304944d7a0dd0c6116abbce9b6b210eb58c5a7d6760c9f9cb43d8bd7d2689582650efbd57ae685d2f994447188a88f309e44922372929f1e7a4e89adce6b85e5cd668bb2eed540cbfa102089a0b184d5e4ec789f41434f3cc36f4cb4388a6802725bcd521ad71dd923659faa5399659d958202c5a8392c52e32dd370f36d0618bb9ce07c863c29d851d5ea56075f44646ffca19e552f99a25897b5fcdfc0c87e7b642095d4c97e6fe510c2df831da04767fcd43c5af610e4ad1d3b15b1c5c709b8dd8a67c3a5351dc457d808a831aeed0ecfb80980ded3ddc4382737ce45ae823ba6ec1c379cd7d3573bba1edd0838693
    public exponent: 10001

] 
2022-06-17 07:08:59.333  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:08:59.337 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:08:59.343 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:08:59.345 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:08:59.346  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:08:59.347  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:08:59.347  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:08:59.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:08:59.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:08:59.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:08:59.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:08:59.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:08:59.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:08:59.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:08:59.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:08:59.555  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:08:59.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:08:59.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:08:59.558  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:08:59.558  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:08:59.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:08:59.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:08:59.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:08:59.566 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:08:59.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:08:59.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:08:59.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:08:59.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:08:59.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:08:59.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:08:59.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: c13db991ae3b29472c1d9baf20fc2b35c6e29e641e9a4a31cfa904ac78118089f8736eb249b5ee561c242d66d929151643848b61537d74da11f094d9a07d4b07d6917670f7ab80c3770c63da1539d5b56452a5667999b32bf0460eb313b3770d4de90ca5e6510227384ba7c7d2d7aff93749f5bec4c44a4048b59cbd8ab6373a2b6979511e4e0d01a94b71d5e46520be1a294a923f312f91b6cb3da3956ede7a7edeb32e0b9b6c6fc4af4bbc5a431eed1f907c380745097001ac64db1b4c3fd691da55af5785e5426e27c5cdf3e5e078b3d44fc97be9c83d548ea2f83e1ec7c147ac36b814376c6d312c1dd4510547c83ff0baa59ce8d19c924054b9ed6a0de19ae36a8e73e68d396a87d0ae99cb2743fef122cdb0748772dff28bc1d137f7c0a08abbbf85455146fb955ccb18e71595b0b663e7283d2b1be2bc3314db9dff327d7158debb95498681ba49b21a793c2e495be1e5d8194e188a0a7a6fb11f8b2fa15930deaf29469c991bbb75c4a14f3a62dac6d4167cf4ef1bb11b5c04dc843d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:a9:45:0b:8d:c3:a8:bc:2e:0e:08:33:7d:86:ff:35:4e:10:29:e5]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 07:13:37.542  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:13:37.545 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:13:37.547 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:13:37.548 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:13:37.548  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:13:37.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:13:37.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:13:37.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:13:37.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:13:37.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:13:37.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:13:37.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:13:37.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:13:37.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:13:37.726  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:13:37.727  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:13:37.728 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:13:37.728 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:13:37.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:13:37.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:13:37.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:13:37.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:13:37.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:13:37.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:13:37.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:13:37.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:13:37.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:13:37.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:13:37.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:13:37.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:13:37.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:d7:da:b3:74:5b:c0:e3:a1:e5:55:9f:b4:aa:96:87:b8:12:40:19]
            modulus: d46e878e21b6f4a2cd9a03f76c51e1c02a672f0685a5297ce9c5bb80a0c69748a1dc95dba7cb22282cd6072949c3d68c022d7e58541857eef39dd28f69bfe08f323612cec390abb0d752c49f3c4ab0a6434a0d0aec7c628735af0357c4c07609b6e3e12c709b16ffb16d28a72cc6952a79c553c60ab9f9532b61916510980018c8c84ca1cc4a588a0cd3eaa49630c544d57779546cdb36ede07209be500804f32903fdf1e7585b000023cf2a5dc319dc48675bf482b70321966790d12d64383a5a853a63e3671d974a8319ff07c65cf699d7091ded09e90959f62e401a08b2f6520ad64ab14655a9dd0462eea797ea9ceb323c047f415650898843887e733bcb
    public exponent: 10001

] 
2022-06-17 07:18:57.796  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:18:57.808 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:18:57.817 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:18:57.819 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:18:57.820  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:18:57.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:18:57.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:18:57.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:18:57.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:18:57.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:18:57.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:18:57.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:18:57.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:18:57.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:18:58.007  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:18:58.008  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:18:58.009 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:18:58.009 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:18:58.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:18:58.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:18:58.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:18:58.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:18:58.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:18:58.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:18:58.015 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:18:58.015 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:18:58.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:18:58.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:18:58.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:18:58.019 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:18:58.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: c13db991ae3b29472c1d9baf20fc2b35c6e29e641e9a4a31cfa904ac78118089f8736eb249b5ee561c242d66d929151643848b61537d74da11f094d9a07d4b07d6917670f7ab80c3770c63da1539d5b56452a5667999b32bf0460eb313b3770d4de90ca5e6510227384ba7c7d2d7aff93749f5bec4c44a4048b59cbd8ab6373a2b6979511e4e0d01a94b71d5e46520be1a294a923f312f91b6cb3da3956ede7a7edeb32e0b9b6c6fc4af4bbc5a431eed1f907c380745097001ac64db1b4c3fd691da55af5785e5426e27c5cdf3e5e078b3d44fc97be9c83d548ea2f83e1ec7c147ac36b814376c6d312c1dd4510547c83ff0baa59ce8d19c924054b9ed6a0de19ae36a8e73e68d396a87d0ae99cb2743fef122cdb0748772dff28bc1d137f7c0a08abbbf85455146fb955ccb18e71595b0b663e7283d2b1be2bc3314db9dff327d7158debb95498681ba49b21a793c2e495be1e5d8194e188a0a7a6fb11f8b2fa15930deaf29469c991bbb75c4a14f3a62dac6d4167cf4ef1bb11b5c04dc843d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:d9:58:53:90:22:5e:0b:fa:1e:01:57:98:e3:0d:10:77:74:6e:67]
            modulus: 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
    public exponent: 10001

] 
2022-06-17 07:23:25.486  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-17 07:23:25.488 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-17 07:23:25.490 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:23:25.491 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-17 07:23:25.491  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-17 07:23:25.492  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-17 07:23:25.492  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-17 07:23:25.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-17 07:23:25.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-17 07:23:25.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-17 07:23:25.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-17 07:23:25.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:23:25.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-17 07:23:25.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:23:25.706  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-17 07:23:25.708  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-17 07:23:25.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-17 07:23:25.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-17 07:23:25.711  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-17 07:23:25.712  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-17 07:23:25.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:23:25.713 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:23:25.713 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:23:25.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:23:25.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:23:25.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:23:25.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-17 07:23:25.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-17 07:23:25.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-17 07:23:25.718 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-17 07:23:25.728 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466591294426945816319314777711680643932902569164
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 17 05:08:33 UTC 2022
           Final Date: Wed Jun 16 05:08:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:fa:33:97:6f:a5:20:81:83:41:d9:36:7c:3b:d2:71:56:7c:83:f4]
            modulus: c13db991ae3b29472c1d9baf20fc2b35c6e29e641e9a4a31cfa904ac78118089f8736eb249b5ee561c242d66d929151643848b61537d74da11f094d9a07d4b07d6917670f7ab80c3770c63da1539d5b56452a5667999b32bf0460eb313b3770d4de90ca5e6510227384ba7c7d2d7aff93749f5bec4c44a4048b59cbd8ab6373a2b6979511e4e0d01a94b71d5e46520be1a294a923f312f91b6cb3da3956ede7a7edeb32e0b9b6c6fc4af4bbc5a431eed1f907c380745097001ac64db1b4c3fd691da55af5785e5426e27c5cdf3e5e078b3d44fc97be9c83d548ea2f83e1ec7c147ac36b814376c6d312c1dd4510547c83ff0baa59ce8d19c924054b9ed6a0de19ae36a8e73e68d396a87d0ae99cb2743fef122cdb0748772dff28bc1d137f7c0a08abbbf85455146fb955ccb18e71595b0b663e7283d2b1be2bc3314db9dff327d7158debb95498681ba49b21a793c2e495be1e5d8194e188a0a7a6fb11f8b2fa15930deaf29469c991bbb75c4a14f3a62dac6d4167cf4ef1bb11b5c04dc843d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c21d4b3a97ac4772e7410eb190c5b2bd1001e62
                       746e602fe2046bddaff187df7946af520166d952
                       14e109fd6e9bf53bcc1ff0ceadb1aa06a86d795a
                       eb67fc4a4445b3266bfcd21cb38475e7f0293bff
                       6bd98ac210840cafb103358d0581e31c5d8b41ce
                       dae7ae6a387aceaf75661417cf0961a4d175a750
                       e54cf68dfdb2b2bdd0d10efb9a68b88cfe37a5f5
                       07a7e883c046e64a503119793d422a9a652a0b58
                       638145f343475e21058e7b10ad5e3a191df04a30
                       f9f1777ea515e92465772f9245aa741e9a84c1b7
                       e0964fee894dcd563d940bf3dfe3d43b1862b875
                       c6acc404e39531d33c1294a39aafea5d5a7994ca
                       ba37d6261fb828f557a3e4ca17e4c5f3c8a10cb1
                       7065619f8d9855dce78787010437f0a31aee6d7d
                       769150d9bdd20ea382e8b4ccb32758f60b9b76d3
                       741242f3e9050d5281e55b4656120bd710c25588
                       ef57dd9117df850fca363c160f1bab6d2364860e
                       f7979baaf42426a81d931e74235e26bfc83f11dc
                       3d9ec2f610272a6a19ff9e55f03e76c862f5a337
                       a2a01404
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:5b:cf:3f:7f:78:99:a0:c7:7a:13:d3:08:ad:07:e5:ce:d6:51:6e]
            modulus: c4d27e906a406be1b5d7ec47f0ae7827cb00c716b48ee91b8fcb707d3799f6e8b511da1decafa69c79a01767304e74c739bf524328a567755a3f5708b6541901392084d8ecd9da5a45c54e0ae4e61d4fbccd146cb342f749c850868d814b4af6e94f7203a6c2f581ee965bcd60cc1d3be3dc50119dabd57929980be363e3c5187c24b921c0219991f7b9a6252801d5bc91932318bf84af9afe615931c79bcff8e0894e946890eeb9598b07eb363b136fb9e50c80798ca38c1ee5d008b245d8082bc47275a2953ad4d3ccfb9c8f8f4cfc2aba264bc24cd164a835c06837c9f8b77bc1a758cebaf51ad1b956792c7ea09d784b78f14dfd709da57912832e236713
    public exponent: 10001

]