Results

By type

          2022-03-31 11:43:13,289 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-31 11:43:18,069 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-31 11:43:20.788  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 31, 2022 11:43:30 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 31, 2022 11:43:30 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 31, 2022 11:43:30 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 31, 2022 11:43:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-31 11:43:32.695 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-31 11:43:34.081  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-31 11:43:34.791  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-31 11:43:38.284 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-31 11:43:38.287 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-31 11:43:38.288 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-31 11:43:38.290 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-31 11:43:38.480 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-31 11:43:38.483 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-31 11:43:39.080 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-31 11:43:43.787 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 31, 2022 11:43:47 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-31 11:43:48.585  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.903 seconds (JVM running for 46.895)
Mar 31, 2022 11:43:57 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-31 11:44:28.075  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 11:44:28.086 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 11:44:28.281 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-31 11:44:28.285 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 11:44:28.382  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-31 11:44:28.385  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 11:44:28.469  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 11:44:28.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 11:44:28.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 11:44:28.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 11:44:28.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 11:44:28.485 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 11:44:28.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 11:44:28.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 11:44:28.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 11:44:28.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 11:44:30.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 11:44:30.087  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 11:44:30.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 11:44:30.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 11:44:30.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 11:44:30.176  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 11:44:30.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 11:44:30.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 11:44:30.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 11:44:30.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 11:44:30.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 11:44:30.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 11:44:30.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 11:44:30.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 11:44:30.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 11:44:30.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 11:44:30.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:2b:6c:9b:09:39:0b:46:79:d2:31:85:1d:aa:ba:64:27:8e:15:06]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 13:19:46.814  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 13:19:46.815 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 13:19:46.817 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-31 13:19:46.818 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 13:19:46.819  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-31 13:19:46.820  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 13:19:46.820  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 13:19:46.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 13:19:46.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 13:19:46.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 13:19:46.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 13:19:46.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:19:46.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:19:46.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:19:47.015  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 13:19:47.016  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 13:19:47.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 13:19:47.017 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:19:47.074  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 13:19:47.074  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 13:19:47.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:19:47.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:19:47.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:19:47.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:19:47.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:19:47.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:19:47.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:19:47.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:19:47.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:19:47.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 13:19:47.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: c684a99dd19f96064ad37167712f31a6bcf25de13660e75b770c3bfe14d76161479b1dac6faf59e33a0504768883f5da1439b33f2d175603a3f5b242bf65115d426e701cb93cefa05b7be250c46cc304c661dbe94ed6c3071d18387bb336ab85c7d2af5a670a199e6a6138dff2da7d078ccaf246c88b5da0dfa2d8cb9744f38b9bfabe46518e9db374c63bad906fcd8ab7e9c0b54e03e1a184a7963470affae7882231e999a668a3a44987a5662638be062dcf91bc3d96a54493e7cabdda908622bbe76ddb6aa84690e9387923f6ec3924ddb3dca941fecbc1eca16d36b1541f5ccf7bd6f0b6ed116ecf065d255e78324fe07d34f2770178ddb7f2694ae3d9a391cf310ef1b2f8ec6e090449a96ca1c6dbd8f0adb929aa3749ea79d2289c3a3c6131360579487537b2b79f1614fb75e7fd5063300a2d32ddb299a567003f9332e2295d511ac658d36a160728f8014ce00f4ace1610d2fca3cdeaf450272c2188b54941e72a5af4f8ab25c6f988425b87692b2b1ee0bc1b4b8aae91c007d17611
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:d6:3e:12:32:a9:b2:f1:2f:88:3b:69:ea:90:4e:29:4e:39:29:04]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 13:30:26.506  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 13:30:26.507 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 13:30:26.568 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 13:30:26.570 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 13:30:26.571  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 13:30:26.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 13:30:26.574  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 13:30:26.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 13:30:26.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 13:30:26.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 13:30:26.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 13:30:26.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:30:26.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:30:26.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:30:26.868  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 13:30:26.869  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 13:30:26.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 13:30:26.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:30:26.872  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 13:30:26.873  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 13:30:26.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:30:26.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:30:26.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:30:26.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:30:26.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:30:26.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:30:26.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:30:26.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:30:26.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:30:26.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 13:30:26.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:d9:5e:83:fc:72:ba:66:6e:59:98:68:6c:84:b6:56:09:11:7e:37]
            modulus: b022105a4f511e610fd582651301f68f824c1b1d9a9d43a14753e69db4fac0dcd9a63b439611ba40b3f910c5b8e8f538ea015eccf2eece4e90fec594f835cb74907b6f678dc67cd9787d5515b14a17aaa82a149eeecfa94d5ffa160adf25d62fe2c3f28594ec421ec3291b5e8ffbb893d9f669566b7c90c148f940c75bb6e56873ee4ecfd12b42721ca8494465ff1799259b03f14672f5f82846ac806078e16b14daadcf8c9043bd8f6196d449ab2d10aa0eac708df26a88b2458ea8c87038436c8a1b3fa4d28a3246291079b452094a5d6b7a6d3009fb9ab3b8cef01725e0e2f10be89c83c97e048f225a2e0988e3d4e8edcf569829c43da852317bd9a5e1f7
    public exponent: 10001

] 
2022-03-31 13:31:40.258  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 13:31:40.260 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 13:31:40.261 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 13:31:40.262 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 13:31:40.262  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 13:31:40.263  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 13:31:40.263  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 13:31:40.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 13:31:40.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 13:31:40.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 13:31:40.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 13:31:40.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:31:40.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:31:40.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:31:40.362  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 13:31:40.363  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 13:31:40.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 13:31:40.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:31:40.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 13:31:40.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 13:31:40.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:31:40.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:31:40.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:31:40.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:31:40.369 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:31:40.369 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:31:40.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:31:40.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:31:40.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:31:40.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 13:31:40.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:06:8a:cb:95:d6:8f:de:da:91:51:2f:e2:b3:39:2c:48:df:95:6c]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 13:52:52.694  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 13:52:52.696 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 13:52:52.698 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 13:52:52.699 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 13:52:52.699  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 13:52:52.700  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 13:52:52.700  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 13:52:52.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 13:52:52.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 13:52:52.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 13:52:52.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 13:52:52.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:52:52.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:52:52.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:52:52.870  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 13:52:52.871  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 13:52:52.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 13:52:52.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:52:52.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 13:52:52.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 13:52:52.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:52:52.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:52:52.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:52:52.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:52:52.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:52:52.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:52:52.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:52:52.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:52:52.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:52:52.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 13:52:52.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:41:dd:fe:b2:78:02:70:0d:50:5a:bd:af:8a:32:ba:6f:6d:24:59]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 13:56:04.019  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 13:56:04.021 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 13:56:04.022 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 13:56:04.023 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 13:56:04.023  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 13:56:04.024  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 13:56:04.024  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 13:56:04.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 13:56:04.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 13:56:04.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 13:56:04.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 13:56:04.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:56:04.031 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:56:04.031 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:56:04.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 13:56:04.164  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 13:56:04.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 13:56:04.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:56:04.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 13:56:04.168  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 13:56:04.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:56:04.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:56:04.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:56:04.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:56:04.171 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:56:04.171 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:56:04.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:56:04.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:56:04.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:56:04.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 13:56:04.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:f4:91:3f:ea:fa:2d:f4:6c:8c:34:31:99:84:dd:8d:13:ad:11:5f]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 13:59:51.913  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 13:59:51.914 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 13:59:51.916 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 13:59:51.916 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 13:59:51.916  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 13:59:51.917  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 13:59:51.917  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 13:59:51.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 13:59:51.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 13:59:51.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 13:59:51.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 13:59:51.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:59:51.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 13:59:51.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:59:52.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 13:59:52.069  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 13:59:52.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 13:59:52.070 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 13:59:52.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 13:59:52.072  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 13:59:52.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:59:52.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:59:52.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:59:52.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:59:52.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:59:52.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:59:52.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 13:59:52.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 13:59:52.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 13:59:52.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 13:59:52.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:a6:db:67:54:e8:05:da:e9:d9:5d:9f:82:6a:a8:a1:04:b1:e8:d9]
            modulus: a310929e1fbe00bed8602fa53158fbfeda23360c5437dabb11b28fe3d256631fc3c727151d960c1ae33820f045961815ab111c9da25ffeb4ee8f78d17e62b21243f452cbb72351681bccbca589a327fc70258ecf24baa2fc67bf4dcd67b188acc840065666a1aa6663fdaf8b363d8d8ce10bcdf4ac60c2f621b28736d7d9e70a695a531900076170210c99048307fe4b0d1af471ddfc163a3015b5106313be7e044d210da3810abd3f5575c98cc4cfa96e03ed18173c2a4d6326339cace0d4bdeaf791bb1f41889b6f545ec3984122827000d2465efdb863ee2fc0d5977d0f3df8c46657d96b12e4a7a63a277d9dfb260e7a0545448d7883fda6dc9985c10bb1
    public exponent: 10001

] 
2022-03-31 14:04:12.331  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:04:12.332 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:04:12.334 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 14:04:12.334 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:04:12.335  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-03-31 14:04:12.335  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:04:12.336  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:04:12.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:04:12.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:04:12.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:04:12.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:04:12.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:04:12.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:04:12.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:04:12.431  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:04:12.432  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:04:12.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:04:12.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:04:12.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:04:12.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:04:12.435 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:12.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:12.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:12.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:12.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:12.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:12.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:12.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:12.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:12.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:04:12.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:5b:5c:ea:f7:63:2e:50:fe:70:72:6d:0c:6e:e5:1b:27:b0:37:df]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:04:20.255  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:04:20.256 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:04:20.257 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:04:20.258 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:04:20.258  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:04:20.258  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:04:20.259  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:04:20.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:04:20.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:04:20.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:04:20.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:04:20.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:04:20.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:04:20.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:04:20.344  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:04:20.345  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:04:20.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:04:20.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:04:20.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:04:20.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:04:20.349 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:20.349 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:20.350 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:20.350 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:20.350 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:20.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:20.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:20.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:20.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:20.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:04:20.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:f8:a8:e3:92:90:a5:c6:85:9b:3d:c3:66:c2:67:50:29:a0:76:60]
            modulus: b10324e7cbe2a84238e9766ea96dfbda5e624cd35ebab55aecba2c05cb32cf2360b25c132bf1ade548436e14ac27353baa3a80488f64ec16794588bb48cba3eb0efaec6ae2979149a195fdeb8b419d3569d7cd739ef28430c54d70b4698c18b4393cb09fdeb69cd177ae2997b2e86ddc307e4bfb0bac4fef165236ac6d5f63067a9dd2b096647241269700dfa3a2df9b74ad5930d8d8578b062c2b77abc430a1a8de3ca1299d146997711cdf5bba28801b2a8e798bb0b0770a1490a5b82bd3a35fc8580e0cd71d0c485cad76e2bbac04ece337f08db477f3212d9f4c5a228c5d9521338c4989e82a9cd32fca8d8aea603ac95e74168c119481c1e6d6a119b9f5
    public exponent: 10001

] 
2022-03-31 14:04:42.889  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:04:42.891 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:04:42.892 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 14:04:42.893 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:04:42.893  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-03-31 14:04:42.893  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:04:42.894  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:04:42.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:04:42.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:04:42.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:04:42.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:04:42.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:04:42.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:04:42.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:04:43.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:04:43.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:04:43.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:04:43.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:04:43.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:04:43.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:04:43.045 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:43.045 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:43.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:43.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:43.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:43.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:43.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:04:43.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:04:43.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:04:43.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:04:43.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: c684a99dd19f96064ad37167712f31a6bcf25de13660e75b770c3bfe14d76161479b1dac6faf59e33a0504768883f5da1439b33f2d175603a3f5b242bf65115d426e701cb93cefa05b7be250c46cc304c661dbe94ed6c3071d18387bb336ab85c7d2af5a670a199e6a6138dff2da7d078ccaf246c88b5da0dfa2d8cb9744f38b9bfabe46518e9db374c63bad906fcd8ab7e9c0b54e03e1a184a7963470affae7882231e999a668a3a44987a5662638be062dcf91bc3d96a54493e7cabdda908622bbe76ddb6aa84690e9387923f6ec3924ddb3dca941fecbc1eca16d36b1541f5ccf7bd6f0b6ed116ecf065d255e78324fe07d34f2770178ddb7f2694ae3d9a391cf310ef1b2f8ec6e090449a96ca1c6dbd8f0adb929aa3749ea79d2289c3a3c6131360579487537b2b79f1614fb75e7fd5063300a2d32ddb299a567003f9332e2295d511ac658d36a160728f8014ce00f4ace1610d2fca3cdeaf450272c2188b54941e72a5af4f8ab25c6f988425b87692b2b1ee0bc1b4b8aae91c007d17611
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:bf:06:15:f6:5a:c2:94:3d:6e:ed:35:88:49:d5:96:bf:57:ac:7f]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:09:54.401  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:09:54.402 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:09:54.404 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:09:54.404 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:09:54.405  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:09:54.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:09:54.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:09:54.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:09:54.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:09:54.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:09:54.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:09:54.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:09:54.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:09:54.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:09:54.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:09:54.518  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:09:54.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:09:54.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:09:54.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:09:54.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:09:54.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:09:54.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:09:54.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:09:54.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:09:54.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:09:54.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:09:54.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:09:54.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:09:54.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:09:54.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:09:54.527 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:c0:ae:ca:d6:ca:05:04:15:f0:9f:46:61:b6:71:e1:a7:df:d7:2f]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:11:21.569  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:11:21.570 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:11:21.571 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-31 14:11:21.571 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:11:21.571  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-31 14:11:21.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:11:21.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:11:21.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:11:21.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:11:21.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:11:21.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:11:21.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:11:21.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:11:21.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:11:21.679  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:11:21.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:11:21.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:11:21.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:11:21.682  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:11:21.683  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:11:21.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:11:21.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:11:21.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:11:21.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:11:21.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:11:21.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:11:21.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:11:21.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:11:21.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:11:21.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:11:21.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:74:af:a8:ec:d1:c8:f1:d6:cc:42:1f:51:a9:1c:58:38:43:2b:4b]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:14:10.500  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:14:10.501 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:14:10.502 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-31 14:14:10.502 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:14:10.503  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-03-31 14:14:10.503  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:14:10.503  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:14:10.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:14:10.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:14:10.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:14:10.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:14:10.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:14:10.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:14:10.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:14:10.592  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:14:10.593  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:14:10.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:14:10.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:14:10.594  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:14:10.595  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:14:10.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:14:10.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:14:10.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:14:10.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:14:10.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:14:10.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:14:10.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:14:10.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:14:10.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:14:10.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:14:10.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:64:56:04:64:33:96:64:52:d5:53:cb:2a:b3:0c:25:ed:3e:9d:29]
            modulus: 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
    public exponent: 10001

] 
2022-03-31 14:17:00.381  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-31 14:17:00.383 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-31 14:17:00.384 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:17:00.385 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-31 14:17:00.385  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-03-31 14:17:00.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-31 14:17:00.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-31 14:17:00.386 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-31 14:17:00.386 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-31 14:17:00.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-31 14:17:00.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-31 14:17:00.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:17:00.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-31 14:17:00.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:17:00.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-31 14:17:00.487  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-31 14:17:00.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-31 14:17:00.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-31 14:17:00.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-31 14:17:00.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-31 14:17:00.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:17:00.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:17:00.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:17:00.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:17:00.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:17:00.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:17:00.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-31 14:17:00.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-31 14:17:00.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-31 14:17:00.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-31 14:17:00.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442886594035489212706171020318032990510099395640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 31 11:40:04 UTC 2022
           Final Date: Tue Mar 30 11:40:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:6b:25:90:07:c5:3c:80:a2:b2:c8:48:a5:d8:4b:ab:47:b3:5b:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2befb3296058ea926d70294b0e836e820343b55
                       938e08d0907ad90148c8e2e1e53be99a1b2fca63
                       95f2d7e95c9df742d36fc3e3a148f3ad5214a222
                       322a7b26d4d2a39a62f3ef10d15dd7e39d9c668b
                       3d5e083d3b1895c3e1b94a72b2cee532a35958b2
                       fd0c881a17c364a42f85f423df1643f278edbf8e
                       77f5a8d90aa38d318a4a55dcdd73ff6e42af7af4
                       e9bb79df39da2a3530a5916dd31bd7b28aaaf650
                       ef1cd5f781c4852b548e192918b53f2ec3c942a4
                       5248a8be890f1c6a4cc697ebbe6ef4f5168fcd10
                       001049daca6fbb06c02fdc8f614a5bcd149fc064
                       78e3d283b0dbe92ac7e9f5dc77e193c642f782bb
                       367d12023d7cd7447ec0dba15fb2cde32cd56138
                       eced43e7e0b942efad700004d7cad64fd1794fcb
                       27970c4411ef8749123d2df39bc021adf042cc07
                       2f9aa4b520507d5593f17ee4ae90584ced07d76e
                       a9ed4b6b60c197257e3c70bdb3349b445d407cd3
                       797a2128834e925d1a431fafb3863b96c267046a
                       a2b55faf81fee9f195ebe62b0b063aa408cdef65
                       59132b55
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:55:ca:14:10:3d:56:48:f6:11:7c:4c:7f:56:b4:4b:84:61:1d:87]
            modulus: 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
    public exponent: 10001

]