Results

By type

          2022-09-05 05:06:54,703 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-09-05 05:06:57,854 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-09-05 05:07:00.428  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Sep 05, 2022 5:07:07 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Sep 05, 2022 5:07:07 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Sep 05, 2022 5:07:07 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Sep 05, 2022 5:07:08 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-09-05 05:07:09.396 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-09-05 05:07:09.982  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-09-05 05:07:10.249  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-09-05 05:07:11.820 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-09-05 05:07:11.825 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-09-05 05:07:11.842 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-09-05 05:07:11.862 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-09-05 05:07:11.963 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-09-05 05:07:11.969 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-09-05 05:07:12.237 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-09-05 05:07:13.884 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Sep 05, 2022 5:07:15 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-09-05 05:07:15.840  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 23.634 seconds (JVM running for 28.36)
Sep 05, 2022 5:07:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-09-05 05:08:59.370  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 05:08:59.386 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 05:08:59.451 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-05 05:08:59.460 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 05:08:59.482  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-05 05:08:59.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 05:08:59.489  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 05:08:59.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 05:08:59.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 05:08:59.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 05:08:59.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 05:08:59.526 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 05:08:59.582 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 05:08:59.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 05:08:59.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 05:08:59.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 05:09:00.744  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 05:09:00.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 05:09:00.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 05:09:00.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 05:09:00.766  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 05:09:00.767  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 05:09:00.769 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 05:09:00.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 05:09:00.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 05:09:00.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 05:09:00.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 05:09:00.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 05:09:00.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 05:09:00.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 05:09:00.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 05:09:00.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 05:09:00.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:0a:f4:f8:6d:ab:0c:38:49:f7:2a:fb:95:44:5a:77:37:be:3b:f7]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:23:32.441  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:23:32.445 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:23:32.449 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:23:32.450 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:23:32.451  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:23:32.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:23:32.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:23:32.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:23:32.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:23:32.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:23:32.467 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:23:32.469 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:23:32.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:23:32.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:23:32.759  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:23:32.761  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:23:32.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:23:32.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:23:32.765  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:23:32.766  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:23:32.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:23:32.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:23:32.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:23:32.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:23:32.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:23:32.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:23:32.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:23:32.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:23:32.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:23:32.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:23:32.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:96:51:61:74:17:c3:b4:67:10:c8:4e:ec:76:2d:af:24:f8:f9:1d]
            modulus: d6bf225c0c83fde57064fa1816b78fd98ee5e34a88f270d2e67a93b630781209e1cbf4a714fb8832b324f0fe9ef04b445daa653e37ede9c3f8257bbedc4cfff054d80b272e9d19a4fc4d8d47664cbadadcef2202007742f5a9d002257f69e126e39e52a27e806a548cee4f52dd2f060b59d501a12dcb88e799ca35eff28d5b0e075386eebfea2f7ce49f70bce7d911a0e04de433c3caaa5cd2fab809a56bcc4843429102e1d16256ff6b6ba99889f117ea930b94bb2beb4ea43558fc8afaaa44a3c7cae2d7d59ec9b388b99811e2e44278163abcafa068b7df5d2bc163e2506aa51d705b9b3cbcbdb7ef951204435e536424a91a97c1fe07125e2acf9546b583
    public exponent: 10001

] 
2022-09-05 06:25:35.922  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:25:35.924 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:25:35.926 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-05 06:25:35.927 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:25:35.927  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-05 06:25:35.928  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:25:35.929  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:25:35.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:25:35.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:25:35.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:25:35.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:25:35.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:25:35.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:25:35.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:25:36.227  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:25:36.228  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:25:36.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:25:36.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:25:36.238  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:25:36.239  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:25:36.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:25:36.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:25:36.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:25:36.243 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:25:36.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:25:36.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:25:36.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:25:36.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:25:36.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:25:36.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:25:36.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:d6:c3:39:e4:cf:bf:cd:81:71:e9:2b:0a:20:a1:ec:a3:74:e0:b3]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:27:14.078  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:27:14.080 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:27:14.093 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-05 06:27:14.095 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:27:14.096  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-05 06:27:14.097  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:27:14.097  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:27:14.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:27:14.098 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:27:14.098 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:27:14.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:27:14.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:27:14.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:27:14.106 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:27:14.423  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:27:14.424  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:27:14.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:27:14.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:27:14.428  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:27:14.428  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:27:14.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:27:14.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:27:14.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:27:14.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:27:14.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:27:14.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:27:14.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:27:14.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:27:14.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:27:14.435 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:27:14.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: b7dbb7c0d9308936fae34401f4de898ce10bb48ce37b8c009da902685c8aec5378ec71802d80049969cb66c845fc12b01c9ccf18ef688ea1e60da920b624e312f26e5fd24e7945d0d68f24301f1665e03ef062f2236737cbd5fad9b9505fdd2445d0378bf459e3f7d18df3e18ae2dcdde07def41c1bdbbad659807acd4e2428924a64a0aecf4b29301d79b2b2732f35997f43c60cfd7f3c45031db33871ead1a0e7a1cf45f0a4ed75b03dfac751939eac12e2def965f7aeb1dbaacf9875f1d7252653195ad2307e16655d0471bf1cc873017a642e60ebfeed82a39196d04786b4121b4477b1fb2a612e643106ddd87195ad199a54980233cffc34d56fd9fb9419d9989c73146c92ee29ba97d96c750660255df5f137071d9f47fceb8d02cb64cf42b2c48f04474c311d15eca98e8a74b87dfb707e506ea4f624c64a47374926fc241a699a11070b2df1d1d116e6cf04bcf640211a55240a1f80051e3469dd2b65a6d4d5b0147be32856709076b74c0d206edc02147ba65af665d843adfece4cb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:3a:9f:d0:c4:21:3f:01:e4:99:93:45:0d:d4:da:cf:2e:81:ad:ff]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:30:16.892  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:30:16.899 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:30:16.901 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:30:16.906 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:30:16.907  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:30:16.907  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:30:16.908  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:30:16.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:30:16.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:30:16.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:30:16.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:30:16.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:30:16.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:30:16.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:30:17.241  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:30:17.241  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:30:17.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:30:17.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:30:17.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:30:17.245  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:30:17.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:30:17.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:30:17.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:30:17.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:30:17.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:30:17.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:30:17.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:30:17.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:30:17.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:30:17.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:30:17.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:76:d9:84:84:31:fd:33:2d:eb:dd:51:a9:7a:99:d6:48:24:b5:f0]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:34:21.592  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:34:21.596 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:34:21.598 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:34:21.599 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:34:21.600  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:34:21.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:34:21.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:34:21.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:34:21.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:34:21.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:34:21.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:34:21.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:34:21.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:34:21.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:34:21.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:34:21.901  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:34:21.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:34:21.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:34:21.903  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:34:21.904  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:34:21.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:34:21.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:34:21.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:34:21.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:34:21.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:34:21.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:34:21.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:34:21.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:34:21.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:34:21.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:34:21.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:2e:ac:a1:97:05:8c:14:70:c8:0d:ac:76:0a:1a:68:28:27:1a:bc]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:38:04.773  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:38:04.777 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:38:04.785 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:38:04.789 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:38:04.791  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:38:04.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:38:04.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:38:04.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:38:04.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:38:04.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:38:04.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:38:04.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:38:04.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:38:04.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:38:05.099  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:38:05.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:38:05.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:38:05.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:38:05.107  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:38:05.107  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:38:05.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:38:05.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:38:05.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:38:05.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:38:05.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:38:05.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:38:05.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:38:05.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:38:05.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:38:05.132 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:38:05.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:35:1d:82:eb:60:eb:0f:d3:0d:69:0c:e4:29:59:23:05:70:d7:0c]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:43:02.558  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:43:02.561 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:43:02.567 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:43:02.568 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:43:02.569  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:43:02.570  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:43:02.571  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:43:02.571 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:43:02.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:43:02.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:43:02.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:43:02.582 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:43:02.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:43:02.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:43:02.953  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:43:02.954  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:43:02.954 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:43:02.955 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:43:02.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:43:02.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:43:02.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:43:02.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:43:02.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:43:02.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:43:02.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:43:02.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:43:02.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:43:02.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:43:02.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:43:02.962 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:43:02.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:09:87:3f:98:9c:79:22:ba:a4:8d:60:f1:a7:1a:c9:c9:42:f1:72]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:44:26.199  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:44:26.200 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:44:26.202 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-05 06:44:26.203 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:44:26.206  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-05 06:44:26.207  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:44:26.207  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:44:26.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:44:26.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:44:26.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:44:26.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:44:26.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:44:26.217 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:44:26.217 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:44:26.520  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:44:26.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:44:26.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:44:26.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:44:26.528  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:44:26.529  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:44:26.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:44:26.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:44:26.536 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:44:26.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:44:26.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:44:26.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:44:26.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:44:26.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:44:26.545 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:44:26.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:44:26.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:44:72:f2:be:41:c2:01:7a:a3:6d:5a:02:21:1d:42:ed:d9:4f:4a]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:46:52.245  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:46:52.248 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:46:52.251 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:46:52.253 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:46:52.253  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:46:52.254  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:46:52.254  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:46:52.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:46:52.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:46:52.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:46:52.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:46:52.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:46:52.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:46:52.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:46:52.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:46:52.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:46:52.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:46:52.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:46:52.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:46:52.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:46:52.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:46:52.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:46:52.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:46:52.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:46:52.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:46:52.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:46:52.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:46:52.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:46:52.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:46:52.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:46:52.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:7e:da:09:77:56:6e:c7:df:10:f0:12:e3:6b:85:d4:46:0b:b8:ac]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:50:29.114  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:50:29.117 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:50:29.120 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:50:29.121 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:50:29.121  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:50:29.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:50:29.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:50:29.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:50:29.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:50:29.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:50:29.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:50:29.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:50:29.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:50:29.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:50:29.462  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:50:29.463  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:50:29.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:50:29.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:50:29.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:50:29.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:50:29.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:50:29.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:50:29.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:50:29.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:50:29.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:50:29.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:50:29.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:50:29.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:50:29.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:50:29.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:50:29.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:60:7f:f5:ce:be:32:4e:df:5d:4d:13:0e:aa:8f:b6:07:e7:bb:e1]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:51:47.837  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:51:47.839 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:51:47.841 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-05 06:51:47.841 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:51:47.841  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-05 06:51:47.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:51:47.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:51:47.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:51:47.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:51:47.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:51:47.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:51:47.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:51:47.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:51:47.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:51:48.155  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:51:48.156  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:51:48.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:51:48.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:51:48.158  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:51:48.159  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:51:48.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:51:48.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:51:48.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:51:48.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:51:48.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:51:48.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:51:48.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:51:48.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:51:48.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:51:48.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:51:48.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:8e:75:38:c9:34:81:71:3b:77:3c:27:c1:e3:a1:a7:12:c6:7d:92]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:52:43.979  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:52:43.981 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:52:43.984 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-05 06:52:43.985 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:52:43.986  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-05 06:52:43.987  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:52:43.987  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:52:43.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:52:43.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:52:43.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:52:43.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:52:43.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:52:43.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:52:44.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:52:44.467  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:52:44.468  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:52:44.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:52:44.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:52:44.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:52:44.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:52:44.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:52:44.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:52:44.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:52:44.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:52:44.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:52:44.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:52:44.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:52:44.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:52:44.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:52:44.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:52:44.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:b6:80:1a:f1:c1:bb:a1:a1:92:61:16:a7:cf:0e:6f:65:8d:d6:34]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 06:55:25.101  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 06:55:25.105 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 06:55:25.112 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:55:25.115 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 06:55:25.115  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 06:55:25.116  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 06:55:25.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 06:55:25.117 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 06:55:25.117 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 06:55:25.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 06:55:25.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 06:55:25.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:55:25.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 06:55:25.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:55:25.476  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 06:55:25.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 06:55:25.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 06:55:25.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 06:55:25.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 06:55:25.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 06:55:25.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:55:25.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:55:25.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:55:25.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:55:25.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:55:25.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:55:25.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 06:55:25.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 06:55:25.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 06:55:25.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 06:55:25.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:af:ad:be:1f:6b:2a:ae:9d:18:c9:9b:a4:10:f5:5a:05:eb:d6:6c]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 07:00:25.687  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 07:00:25.689 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 07:00:25.692 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:00:25.694 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 07:00:25.695  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:00:25.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 07:00:25.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 07:00:25.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 07:00:25.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 07:00:25.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 07:00:25.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 07:00:25.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:00:25.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:00:25.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:00:26.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 07:00:26.050  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 07:00:26.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 07:00:26.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:00:26.053  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 07:00:26.053  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 07:00:26.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:00:26.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:00:26.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:00:26.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:00:26.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:00:26.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:00:26.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:00:26.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:00:26.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:00:26.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 07:00:26.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:e3:e6:1f:23:d3:ac:e6:fe:a4:95:ee:57:92:e7:4b:0d:d9:9e:29]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 07:04:55.390  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 07:04:55.393 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 07:04:55.397 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:04:55.399 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 07:04:55.399  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:04:55.400  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 07:04:55.400  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 07:04:55.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 07:04:55.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 07:04:55.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 07:04:55.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 07:04:55.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:04:55.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:04:55.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:04:55.816  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 07:04:55.817  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 07:04:55.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 07:04:55.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:04:55.819  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 07:04:55.819  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 07:04:55.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:04:55.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:04:55.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:04:55.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:04:55.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:04:55.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:04:55.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:04:55.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:04:55.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:04:55.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 07:04:55.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:da:7c:9d:dd:5a:63:a3:4a:3b:61:62:8d:81:45:7e:9e:3e:40:e9]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 07:13:52.781  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 07:13:52.784 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 07:13:52.787 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:13:52.788 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 07:13:52.789  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:13:52.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 07:13:52.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 07:13:52.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 07:13:52.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 07:13:52.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 07:13:52.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 07:13:52.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:13:52.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:13:52.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:13:53.087  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 07:13:53.088  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 07:13:53.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 07:13:53.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:13:53.090  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 07:13:53.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 07:13:53.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:13:53.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:13:53.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:13:53.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:13:53.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:13:53.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:13:53.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:13:53.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:13:53.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:13:53.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 07:13:53.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:e5:ef:b2:20:cf:75:70:29:45:2f:37:48:31:2a:96:dd:ca:98:cb]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 07:16:10.842  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 07:16:10.844 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 07:16:10.846 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-05 07:16:10.847 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 07:16:10.848  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-05 07:16:10.849  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 07:16:10.849  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 07:16:10.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 07:16:10.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 07:16:10.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 07:16:10.857 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 07:16:10.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:16:10.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:16:10.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:16:11.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 07:16:11.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 07:16:11.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 07:16:11.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:16:11.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 07:16:11.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 07:16:11.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:16:11.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:16:11.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:16:11.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:16:11.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:16:11.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:16:11.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:16:11.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:16:11.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:16:11.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 07:16:11.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:4b:03:ed:eb:37:2c:b5:5d:44:f3:c7:41:3a:a1:ee:06:41:7d:28]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 07:16:20.653  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 07:16:20.655 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 07:16:20.656 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-05 07:16:20.657 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 07:16:20.658  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-05 07:16:20.659  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 07:16:20.659  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 07:16:20.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 07:16:20.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 07:16:20.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 07:16:20.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 07:16:20.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:16:20.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:16:20.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:16:20.899  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 07:16:20.900  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 07:16:20.900 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 07:16:20.901 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:16:20.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 07:16:20.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 07:16:20.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:16:20.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:16:20.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:16:20.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:16:20.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:16:20.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:16:20.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:16:20.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:16:20.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:16:20.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 07:16:20.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:18:f9:d4:24:b7:60:a8:ed:8c:da:e1:a1:5c:3a:53:9b:53:3b:73]
            modulus: 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
    public exponent: 10001

] 
2022-09-05 07:18:37.603  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-05 07:18:37.610 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-05 07:18:37.612 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:18:37.613 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-05 07:18:37.613  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-05 07:18:37.614  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-05 07:18:37.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-05 07:18:37.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-05 07:18:37.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-05 07:18:37.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-05 07:18:37.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-05 07:18:37.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:18:37.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-05 07:18:37.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:18:37.971  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-05 07:18:37.971  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-05 07:18:37.972 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-05 07:18:37.972 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-05 07:18:37.977  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-05 07:18:37.977  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-05 07:18:37.978 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:18:37.978 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:18:37.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:18:37.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:18:37.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:18:37.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:18:37.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-05 07:18:37.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-05 07:18:37.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-05 07:18:37.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-05 07:18:37.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 392591128107666671375480646564792554120979652184
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 05 05:02:50 UTC 2022
           Final Date: Sat Sep 04 05:02:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:2b:56:24:0b:38:03:de:3a:d4:bb:22:0e:fb:06:3d:67:4f:1e:8d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b65d2f7caf1b8c5a5ac3424eba48b5f607695b8f
                       721910b4911caf1facf1071c4ac051350d1bd0d1
                       1c4e176be5789bd08f64cdd2735cb1b2350641c1
                       42322607d284667f953d66364a18d1ba8b1dd56a
                       ff14081e98ab586ef6c3ff7220d49d3ce5e9ed3c
                       0ca2b29ea7c4f9e911958a8751be348426a85e70
                       e93ff969bbcc51fa9d68879b37af23c4756dd2ef
                       d79ad336789aef99f8b09440c3f0780ffcb1c30d
                       9e4cedfe4cf4ee9b5e1c9810e4dab6ed8db96c4e
                       3508f44f3bfe89ad00a84da3afda724174efb2bc
                       bddba1736a43100d17735b02d3adbc2ca0aa10ee
                       1a239f0e960aa0c3d4151cb3cbe68d63f18694de
                       ca8a6d454f7b368fabc1558660225779527854da
                       83e0bdc22d845ea7d7ead2dd434e134910e5e042
                       587ef0e403c71ffae2ad85cba06425a312713133
                       05e2222ab0eb2097e8d700efb347f476dd23439c
                       26022841540f23dce610267aee77bc3e15f0b6d1
                       079266d71f2af2a815c6ae760c681665d88101d0
                       cd807c87ed33f9a5a6879d63caaf60b5d7a4f247
                       65a39071
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:83:d3:64:5c:38:6c:7e:49:2d:74:82:42:59:e6:73:90:0d:c5:33]
            modulus: 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
    public exponent: 10001

]