Results

By type

          2022-06-20 05:15:58,102 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-20 05:15:59,284 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-20 05:16:00.239  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 20, 2022 5:16:02 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 20, 2022 5:16:02 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 20, 2022 5:16:02 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 20, 2022 5:16:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-20 05:16:02.630 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-20 05:16:02.901  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-20 05:16:03.054  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-20 05:16:03.751 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-20 05:16:03.754 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-20 05:16:03.755 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-20 05:16:03.759 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-20 05:16:03.798 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-20 05:16:03.801 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-20 05:16:03.919 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-20 05:16:04.518 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 20, 2022 5:16:05 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-20 05:16:05.388  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.078 seconds (JVM running for 9.706)
Jun 20, 2022 5:16:29 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-20 05:16:57.685  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 05:16:57.694 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 05:16:57.729 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-20 05:16:57.733 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 05:16:57.748  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-20 05:16:57.751  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 05:16:57.752  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 05:16:57.753 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 05:16:57.754 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 05:16:57.758 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 05:16:57.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 05:16:57.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 05:16:57.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 05:16:57.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 05:16:57.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 05:16:57.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 05:16:58.821  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 05:16:58.824  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 05:16:58.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 05:16:58.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 05:16:58.858  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 05:16:58.860  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 05:16:58.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 05:16:58.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 05:16:58.862 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 05:16:58.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 05:16:58.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 05:16:58.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 05:16:58.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 05:16:58.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 05:16:58.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 05:16:58.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 05:16:58.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:a1:0f:3a:f9:b8:d7:b7:a1:4e:eb:86:0a:81:65:9a:07:a3:c2:da]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 06:53:13.060  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 06:53:13.063 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 06:53:13.067 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 06:53:13.068 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 06:53:13.069  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 06:53:13.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 06:53:13.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 06:53:13.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 06:53:13.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 06:53:13.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 06:53:13.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 06:53:13.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:53:13.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:53:13.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:53:13.879  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 06:53:13.883  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 06:53:13.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 06:53:13.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:53:13.887  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 06:53:13.892  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 06:53:13.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:53:13.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:53:13.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:53:13.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:53:13.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:53:13.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:53:13.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:53:13.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:53:13.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:53:13.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 06:53:13.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: cf64631e7dbaa88553b5bfe3f72f50c572bbe920b082ccc47e4cabe99cfa5fa05a64ccfc0d35854e54c4595bce32bcca52fa514fc4f1795778e3d1071a2385775fa6cd18283ece55233397b7fa8cd546193ee59c69b7b28ce6b92f1d6114b338ce2a8acb9b19f7e1b832fcb7ebaa2c116b0795ce149e3bdc5355ca3fc88b959437344e350bd6d26825124cc2d3b136a33b207077c77651497c9dc0e0753241373594ed58268a1dde64bdeb2c0f7a6f7ed9f8a35c92ba7674565662749e0b58e807bf1eb469b83d9ee29dff3ad6f7649ad3fa1faa8da67742de327c038a82281166c37a634bc8f82af9704a8bfab936760dbd81cbff2da63b6175bb4dffcc1d1b9c907b90eaacd234a3f501a8e309f07bb625f5f54ee62dbd2ba4043fb1a7e55d1d1895d2c9092aee38664dbfe9ffec54a5fd83d3b86a92f949419faf77b7e8936ee55a68fc47ed94f78a3836a1d7e1f8dda345d5f61920ea4aa2c13a1f132505a8ce02b8bbdd00a3140b57f148b733aedce315055a37652974caeca28cdff26d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:83:ee:c9:80:70:3c:b9:2a:cc:a5:8d:e8:2a:04:74:78:17:d6:12]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 06:56:17.940  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 06:56:17.943 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 06:56:17.946 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 06:56:17.947 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 06:56:17.949  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 06:56:17.954  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 06:56:17.955  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 06:56:17.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 06:56:17.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 06:56:17.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 06:56:17.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 06:56:17.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:56:17.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:56:17.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:56:18.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 06:56:18.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 06:56:18.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 06:56:18.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:56:18.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 06:56:18.334  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 06:56:18.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:56:18.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:56:18.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:56:18.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:56:18.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:56:18.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:56:18.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:56:18.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:56:18.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:56:18.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 06:56:18.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:05:4c:11:03:b7:bd:fc:1a:32:7a:0b:27:03:67:da:cd:31:1a:0f]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 06:57:36.934  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 06:57:36.940 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 06:57:36.943 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-20 06:57:36.944 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 06:57:36.945  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-20 06:57:36.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 06:57:36.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 06:57:36.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 06:57:36.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 06:57:36.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 06:57:36.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 06:57:36.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:57:36.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:57:36.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:57:37.263  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 06:57:37.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 06:57:37.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 06:57:37.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:57:37.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 06:57:37.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 06:57:37.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:57:37.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:57:37.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:57:37.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:57:37.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:57:37.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:57:37.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:57:37.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:57:37.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:57:37.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 06:57:37.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:d1:0c:96:c6:36:1d:95:76:d4:f2:20:09:15:69:ea:84:c4:64:fb]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 06:59:57.714  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 06:59:57.717 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 06:59:57.718 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-20 06:59:57.719 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 06:59:57.720  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-20 06:59:57.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 06:59:57.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 06:59:57.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 06:59:57.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 06:59:57.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 06:59:57.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 06:59:57.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:59:57.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 06:59:57.732 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:59:58.365  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 06:59:58.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 06:59:58.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 06:59:58.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 06:59:58.369  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 06:59:58.369  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 06:59:58.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:59:58.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:59:58.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:59:58.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:59:58.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:59:58.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:59:58.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 06:59:58.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 06:59:58.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 06:59:58.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 06:59:58.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:48:ff:ff:ad:d9:5c:81:58:c4:28:6d:bc:9c:af:db:6f:49:89:65]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:01:53.506  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:01:53.509 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:01:53.511 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:01:53.511 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:01:53.512  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:01:53.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:01:53.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:01:53.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:01:53.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:01:53.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:01:53.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:01:53.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:01:53.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:01:53.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:01:53.805  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:01:53.805  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:01:53.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:01:53.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:01:53.807  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:01:53.808  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:01:53.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:01:53.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:01:53.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:01:53.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:01:53.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:01:53.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:01:53.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:01:53.811 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:01:53.811 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:01:53.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:01:53.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: cf64631e7dbaa88553b5bfe3f72f50c572bbe920b082ccc47e4cabe99cfa5fa05a64ccfc0d35854e54c4595bce32bcca52fa514fc4f1795778e3d1071a2385775fa6cd18283ece55233397b7fa8cd546193ee59c69b7b28ce6b92f1d6114b338ce2a8acb9b19f7e1b832fcb7ebaa2c116b0795ce149e3bdc5355ca3fc88b959437344e350bd6d26825124cc2d3b136a33b207077c77651497c9dc0e0753241373594ed58268a1dde64bdeb2c0f7a6f7ed9f8a35c92ba7674565662749e0b58e807bf1eb469b83d9ee29dff3ad6f7649ad3fa1faa8da67742de327c038a82281166c37a634bc8f82af9704a8bfab936760dbd81cbff2da63b6175bb4dffcc1d1b9c907b90eaacd234a3f501a8e309f07bb625f5f54ee62dbd2ba4043fb1a7e55d1d1895d2c9092aee38664dbfe9ffec54a5fd83d3b86a92f949419faf77b7e8936ee55a68fc47ed94f78a3836a1d7e1f8dda345d5f61920ea4aa2c13a1f132505a8ce02b8bbdd00a3140b57f148b733aedce315055a37652974caeca28cdff26d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:de:d0:6a:c7:a6:c4:62:38:df:bc:f1:f3:ec:01:b9:02:3d:ba:c3]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:07:43.959  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:07:43.965 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:07:43.969 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:07:43.970 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:07:43.970  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:07:43.971  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:07:43.972  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:07:43.972 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:07:43.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:07:43.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:07:43.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:07:43.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:07:43.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:07:43.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:07:44.238  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:07:44.239  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:07:44.239 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:07:44.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:07:44.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:07:44.246  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:07:44.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:07:44.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:07:44.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:07:44.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:07:44.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:07:44.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:07:44.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:07:44.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:07:44.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:07:44.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:07:44.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:6f:a0:02:e5:05:b4:73:72:27:0f:91:6b:e4:fd:51:d5:97:da:83]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:08:23.386  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:08:23.388 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:08:23.390 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-20 07:08:23.391 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:08:23.391  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-20 07:08:23.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:08:23.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:08:23.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:08:23.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:08:23.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:08:23.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:08:23.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:08:23.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:08:23.406 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:08:23.739  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:08:23.740  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:08:23.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:08:23.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:08:23.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:08:23.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:08:23.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:08:23.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:08:23.753 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:08:23.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:08:23.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:08:23.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:08:23.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:08:23.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:08:23.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:08:23.761 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:08:23.768 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:01:c7:8e:8a:19:2d:f8:da:7e:41:8c:fe:60:57:8b:1b:d4:23:8e]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:12:16.012  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:12:16.014 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:12:16.021 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:12:16.023 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:12:16.023  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:12:16.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:12:16.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:12:16.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:12:16.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:12:16.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:12:16.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:12:16.035 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:12:16.035 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:12:16.036 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:12:16.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:12:16.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:12:16.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:12:16.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:12:16.298  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:12:16.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:12:16.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:12:16.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:12:16.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:12:16.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:12:16.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:12:16.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:12:16.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:12:16.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:12:16.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:12:16.312 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:12:16.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:a3:c8:54:19:da:1e:bf:34:df:67:38:7e:d4:e6:be:34:ba:ce:e2]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:14:26.637  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:14:26.638 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:14:26.641 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-20 07:14:26.642 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:14:26.643  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-20 07:14:26.644  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:14:26.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:14:26.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:14:26.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:14:26.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:14:26.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:14:26.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:14:26.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:14:26.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:14:27.058  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:14:27.059  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:14:27.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:14:27.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:14:27.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:14:27.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:14:27.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:14:27.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:14:27.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:14:27.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:14:27.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:14:27.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:14:27.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:14:27.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:14:27.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:14:27.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:14:27.077 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:b7:f6:cb:a6:8f:7f:b8:83:7a:57:a9:22:c6:6f:af:b4:ac:7f:95]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:14:45.357  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:14:45.358 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:14:45.359 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-20 07:14:45.359 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:14:45.360  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-20 07:14:45.360  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:14:45.361  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:14:45.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:14:45.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:14:45.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:14:45.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:14:45.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:14:45.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:14:45.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:14:45.695  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:14:45.696  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:14:45.697 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:14:45.697 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:14:45.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:14:45.699  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:14:45.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:14:45.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:14:45.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:14:45.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:14:45.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:14:45.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:14:45.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:14:45.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:14:45.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:14:45.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:14:45.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:ec:eb:13:ac:4d:cd:a7:02:4c:3f:cb:fa:49:83:f9:2f:3f:16:dd]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:17:04.456  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:17:04.457 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:17:04.460 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:17:04.460 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:17:04.461  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:17:04.462  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:17:04.462  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:17:04.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:17:04.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:17:04.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:17:04.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:17:04.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:17:04.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:17:04.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:17:04.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:17:04.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:17:04.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:17:04.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:17:04.701  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:17:04.701  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:17:04.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:17:04.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:17:04.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:17:04.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:17:04.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:17:04.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:17:04.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:17:04.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:17:04.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:17:04.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:17:04.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:c5:50:40:c3:e8:28:7c:7c:b3:4b:e9:58:0a:c6:be:6e:69:47:dc]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:21:31.701  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:21:31.703 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:21:31.706 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:21:31.707 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:21:31.707  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:21:31.708  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:21:31.708  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:21:31.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:21:31.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:21:31.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:21:31.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:21:31.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:21:31.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:21:31.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:21:32.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:21:32.002  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:21:32.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:21:32.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:21:32.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:21:32.005  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:21:32.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:21:32.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:21:32.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:21:32.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:21:32.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:21:32.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:21:32.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:21:32.009 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:21:32.009 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:21:32.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:21:32.013 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:fd:89:a2:80:03:49:ee:f1:65:10:4b:69:7a:02:25:34:38:36:c2]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:26:15.648  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:26:15.650 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:26:15.651 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:26:15.652 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:26:15.652  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:26:15.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:26:15.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:26:15.653 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:26:15.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:26:15.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:26:15.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:26:15.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:26:15.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:26:15.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:26:15.957  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:26:15.958  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:26:15.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:26:15.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:26:15.959  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:26:15.959  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:26:15.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:26:15.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:26:15.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:26:15.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:26:15.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:26:15.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:26:15.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:26:15.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:26:15.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:26:15.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:26:15.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:06:b4:c4:97:06:f1:50:2b:05:71:18:9b:c1:21:2e:aa:1d:64:d8]
            modulus: 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
    public exponent: 10001

] 
2022-06-20 07:31:41.073  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:31:41.075 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:31:41.077 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:31:41.078 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:31:41.078  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:31:41.079  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:31:41.080  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:31:41.080 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:31:41.080 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:31:41.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:31:41.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:31:41.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:31:41.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:31:41.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:31:41.415  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:31:41.416  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:31:41.417 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:31:41.417 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:31:41.419  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:31:41.419  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:31:41.420 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:31:41.420 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:31:41.420 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:31:41.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:31:41.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:31:41.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:31:41.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:31:41.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:31:41.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:31:41.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:31:41.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: cf64631e7dbaa88553b5bfe3f72f50c572bbe920b082ccc47e4cabe99cfa5fa05a64ccfc0d35854e54c4595bce32bcca52fa514fc4f1795778e3d1071a2385775fa6cd18283ece55233397b7fa8cd546193ee59c69b7b28ce6b92f1d6114b338ce2a8acb9b19f7e1b832fcb7ebaa2c116b0795ce149e3bdc5355ca3fc88b959437344e350bd6d26825124cc2d3b136a33b207077c77651497c9dc0e0753241373594ed58268a1dde64bdeb2c0f7a6f7ed9f8a35c92ba7674565662749e0b58e807bf1eb469b83d9ee29dff3ad6f7649ad3fa1faa8da67742de327c038a82281166c37a634bc8f82af9704a8bfab936760dbd81cbff2da63b6175bb4dffcc1d1b9c907b90eaacd234a3f501a8e309f07bb625f5f54ee62dbd2ba4043fb1a7e55d1d1895d2c9092aee38664dbfe9ffec54a5fd83d3b86a92f949419faf77b7e8936ee55a68fc47ed94f78a3836a1d7e1f8dda345d5f61920ea4aa2c13a1f132505a8ce02b8bbdd00a3140b57f148b733aedce315055a37652974caeca28cdff26d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:00:f7:d7:5f:5a:57:14:28:2d:06:ae:e7:bc:8b:61:f0:e4:a6:7e]
            modulus: b8a83c27e701f19768506f13e012855aa1976c7dd359d7e7bf2538bd7790e696ccf8960ef7613c9559603779dccd6ae16460a5dd10909e2da1d98717a1b6ecfff243dc888649f7fc7c5b073584dc7abac4da85dab81872fba907267b3568ab01ff43d0590c932f82f31d9adeccec0ee8afc948ec8a027edbecade7087ac5effbe988ed2038437156e9293acd23bbe9e0b9dbd9032a327bafc16d9b0f5d16a4b96a6bda478f7d1ad7e698c555c051c79f23c20d79273cf9fe61c1c7d039f24cf9bc6f2129361a9c5dcd11ffbd4ec1798073595e27bafa09d1470a921765aee5640bfc39f88a0df1e9ddf85ff680dfaf5ea95dccc8cf69277483ee3782a54662d3
    public exponent: 10001

] 
2022-06-20 07:36:23.072  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-20 07:36:23.077 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-20 07:36:23.079 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:36:23.084 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-20 07:36:23.084  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-20 07:36:23.085  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-20 07:36:23.085  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-20 07:36:23.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-20 07:36:23.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-20 07:36:23.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-20 07:36:23.098 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-20 07:36:23.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:36:23.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-20 07:36:23.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:36:23.488  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-20 07:36:23.489  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-20 07:36:23.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-20 07:36:23.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-20 07:36:23.493  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-20 07:36:23.493  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-20 07:36:23.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:36:23.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:36:23.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:36:23.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:36:23.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:36:23.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:36:23.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-20 07:36:23.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-20 07:36:23.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-20 07:36:23.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-20 07:36:23.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 622584073040627569830519208393481594767837916491
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 20 05:11:33 UTC 2022
           Final Date: Sat Jun 19 05:11:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:7f:22:ad:11:b8:0a:00:e4:fd:73:96:79:5d:49:1f:b4:f8:9b:3e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1153e5f3b9c6bb6672c22f271fc8afb915f785fc
                       b9fcdadf0d2260bd2a0586a77e8d5da95e8fcd3c
                       0bdf7eb4c7ac680721a592d0ef1d56b3c9912610
                       614e97a80d9967a1471ded15d62088cecca53061
                       ec041c39ba4619d1075d91babd082746a2070ca8
                       c00fd335eac6c306e29d474243b80be49ad97b3f
                       b90f8f5e706d3aaf7ff131a6da32b1e503aea2c2
                       e5643b9cd629b31320b4ef007758c7e4f6ce3515
                       3bf473442bd20ee2652323a48d578b989a5e53b2
                       60dce1bc287990a2e0b4887be92c7db172533694
                       f640f7c28018906cb5ddb07cc621d91a33815d96
                       84d2963ab0b1e30b5e1a65940a2813fdcea4c10b
                       dca181d7b85edafbe600ba36fa01a506fa653ee6
                       f954a0fbc2926dd779acb7267126b621005a32d0
                       ca560bdbee946884b07611536e98be0fc57f63b8
                       4388bcf7cdc9082c842da5f13ef39e9f3b875b84
                       eb768f97ee68caa6a749c1510a062a0220d720c9
                       8e938dde269ded1410c87e1fcf22fb0d97d69536
                       26867910dfd85616f04dc3bc0e5ff3e1d10f90be
                       ce466150
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:04:79:e1:e9:56:0d:5a:be:bc:08:d2:37:68:49:57:17:8c:2d:d9]
            modulus: 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
    public exponent: 10001

]