Results

By type

          2022-05-10 01:43:46,160 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-10 01:43:50,838 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-10 01:43:53.851  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 10, 2022 1:44:03 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 10, 2022 1:44:03 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 10, 2022 1:44:03 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 10, 2022 1:44:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-10 01:44:05.937 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-10 01:44:07.153  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-10 01:44:08.153  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-10 01:44:11.137 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-10 01:44:11.141 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-10 01:44:11.142 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-10 01:44:11.146 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-10 01:44:11.341 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-10 01:44:11.344 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-10 01:44:11.874 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-10 01:44:17.054 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 10, 2022 1:44:20 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-10 01:44:21.240  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.681 seconds (JVM running for 46.045)
May 10, 2022 1:44:29 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-10 01:45:19.045  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 01:45:19.051 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 01:45:19.244 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-10 01:45:19.247 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 01:45:19.339  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-10 01:45:19.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 01:45:19.342  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 01:45:19.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 01:45:19.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 01:45:19.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 01:45:19.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 01:45:19.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 01:45:19.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 01:45:19.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 01:45:19.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 01:45:19.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 01:45:21.087  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 01:45:21.089  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 01:45:21.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 01:45:21.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 01:45:21.137  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 01:45:21.138  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 01:45:21.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 01:45:21.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 01:45:21.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 01:45:21.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 01:45:21.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 01:45:21.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 01:45:21.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 01:45:21.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 01:45:21.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 01:45:21.161 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 01:45:21.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 887a7da0d00b23f7e667e135650aa8422969362a71ae2fdc1979023c342ee90c56a657817589dba892add7a3e4bf8776e76abbe2904991631278defce37f76fe3d76d1cbebf6d858af38adddad40069b6701067a980be9290613bc314925c0bed185517747d6e11c1ab105bb2715ca7c6d01c6356dc77c123d715ea530c70e0178c9a8f7308feb7cba0caad371dcf948486d6b826860afd33696390bd8e0eaed320eb8d362fb0ec0a74c2665a399cef0fa9e88256100d8d8228da43b013fc78c8e61a23998e9300906ed7e6cba45dc0e24d2b12f44de10636a4e4f17e99213e4618b781d5d11e2fe37f5f48faabdc8f657eab11afaa3cf7aed86f41d919c9a8869bf28f2cdef3499ed18dcbfcf8fa956bcc7dd71631c67fe211dd70428eb0bcf40de486937367cce21cc5b20488f4c55e1d232f305902eaf12a4b5771f0b20d858b2bff3b1545414e19b98f52ab1f8b7b58e538aaef4a63617b0e80d3a0e8e6fe1af872a5c4813ac647b60abf42619736c4580be503d15a3ac82bd5b93d80c23
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:39:03:ee:dd:1b:0f:d2:e2:aa:5f:75:12:e9:54:e2:3d:f8:2d:47]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:15:53.019  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:15:53.021 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:15:53.023 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:15:53.024 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:15:53.025  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:15:53.025  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:15:53.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:15:53.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:15:53.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:15:53.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:15:53.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:15:53.038 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:15:53.038 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:15:53.038 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:15:53.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:15:53.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:15:53.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:15:53.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:15:53.158  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:15:53.158  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:15:53.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:15:53.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:15:53.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:15:53.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:15:53.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:15:53.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:15:53.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:15:53.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:15:53.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:15:53.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:15:53.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:f7:74:fe:16:b6:37:b6:73:85:73:0e:a9:e6:b3:61:ca:61:24:e2]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:19:15.069  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:19:15.070 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:19:15.071 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:19:15.072 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:19:15.072  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:19:15.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:19:15.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:19:15.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:19:15.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:19:15.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:19:15.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:19:15.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:19:15.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:19:15.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:19:15.242  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:19:15.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:19:15.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:19:15.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:19:15.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:19:15.246  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:19:15.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:19:15.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:19:15.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:19:15.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:19:15.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:19:15.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:19:15.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:19:15.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:19:15.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:19:15.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:19:15.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:42:f5:d6:7f:d2:6c:49:b1:94:15:89:a1:b3:8f:00:6e:ed:de:21]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:20:36.003  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:20:36.004 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:20:36.005 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-10 03:20:36.006 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:20:36.006  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-10 03:20:36.007  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:20:36.007  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:20:36.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:20:36.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:20:36.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:20:36.014 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:20:36.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:20:36.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:20:36.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:20:36.125  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:20:36.137  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:20:36.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:20:36.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:20:36.140  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:20:36.140  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:20:36.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:20:36.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:20:36.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:20:36.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:20:36.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:20:36.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:20:36.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:20:36.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:20:36.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:20:36.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:20:36.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 887a7da0d00b23f7e667e135650aa8422969362a71ae2fdc1979023c342ee90c56a657817589dba892add7a3e4bf8776e76abbe2904991631278defce37f76fe3d76d1cbebf6d858af38adddad40069b6701067a980be9290613bc314925c0bed185517747d6e11c1ab105bb2715ca7c6d01c6356dc77c123d715ea530c70e0178c9a8f7308feb7cba0caad371dcf948486d6b826860afd33696390bd8e0eaed320eb8d362fb0ec0a74c2665a399cef0fa9e88256100d8d8228da43b013fc78c8e61a23998e9300906ed7e6cba45dc0e24d2b12f44de10636a4e4f17e99213e4618b781d5d11e2fe37f5f48faabdc8f657eab11afaa3cf7aed86f41d919c9a8869bf28f2cdef3499ed18dcbfcf8fa956bcc7dd71631c67fe211dd70428eb0bcf40de486937367cce21cc5b20488f4c55e1d232f305902eaf12a4b5771f0b20d858b2bff3b1545414e19b98f52ab1f8b7b58e538aaef4a63617b0e80d3a0e8e6fe1af872a5c4813ac647b60abf42619736c4580be503d15a3ac82bd5b93d80c23
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:b8:06:91:04:82:75:13:12:0a:96:00:d0:ce:56:d7:66:ba:9e:3b]
            modulus: c56ee4872940d634f73bf7f17e8817230560471cbd86efcbc95b68cf648dcec427f8e072de0ace0dc1677da7dabacef55bd42012e6c7f279648b16ccb0d60eeda2e6b8570e2d94ce00ea69e31d561bbfde1ba27bf1ba0ea739f7c68fe8958535dd031f657d3c0af6d5f16b3fed31cd7b0a390ac3dec7034004688e6b7e3fe05187c33ffc3c45b2bf3f691576a6353115379f2184387ae4bb974e21d04446f0984358791f2fd17d2ddd47610e379e6c7952cc66ad67fb72476ea8b45eea68e960ee8f3db7892b4c933e83ce013612223b5dd99ec4c0ae7a5faec41e0a4201e6a8ba17b4d3d3809d434c07823c39ab4ad8a0463d0bbe67619adeed0ba9730dcc2b
    public exponent: 10001

] 
2022-05-10 03:22:06.998  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:22:06.999 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:22:07.000 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-10 03:22:07.004 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:22:07.004  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-10 03:22:07.004  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:22:07.005  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:22:07.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:22:07.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:22:07.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:22:07.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:22:07.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:22:07.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:22:07.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:22:07.109  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:22:07.109  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:22:07.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:22:07.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:22:07.112  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:22:07.112  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:22:07.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:22:07.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:22:07.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:22:07.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:22:07.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:22:07.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:22:07.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:22:07.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:22:07.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:22:07.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:22:07.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:c2:a0:1a:dc:83:77:09:ad:1c:b8:65:89:a7:ff:e0:b0:52:6b:78]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:25:07.501  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:25:07.503 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:25:07.505 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:25:07.506 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:25:07.507  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:25:07.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:25:07.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:25:07.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:25:07.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:25:07.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:25:07.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:25:07.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:25:07.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:25:07.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:25:07.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:25:07.627  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:25:07.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:25:07.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:25:07.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:25:07.630  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:25:07.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:25:07.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:25:07.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:25:07.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:25:07.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:25:07.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:25:07.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:25:07.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:25:07.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:25:07.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:25:07.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:70:12:92:98:74:f7:33:ba:e6:27:bc:c7:87:e2:ed:4f:24:d1:73]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:28:53.895  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:28:53.896 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:28:53.898 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-10 03:28:53.898 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:28:53.899  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-10 03:28:53.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:28:53.900  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:28:53.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:28:53.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:28:53.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:28:53.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:28:53.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:28:53.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:28:53.909 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:28:54.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:28:54.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:28:54.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:28:54.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:28:54.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:28:54.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:28:54.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:28:54.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:28:54.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:28:54.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:28:54.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:28:54.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:28:54.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:28:54.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:28:54.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:28:54.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:28:54.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:21:23:cd:e4:c6:a1:f4:56:24:6b:82:87:ab:4f:6a:52:8c:b6:55]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:30:49.287  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:30:49.288 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:30:49.289 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:30:49.289 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:30:49.290  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:30:49.290  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:30:49.290  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:30:49.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:30:49.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:30:49.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:30:49.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:30:49.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:30:49.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:30:49.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:30:49.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:30:49.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:30:49.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:30:49.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:30:49.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:30:49.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:30:49.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:30:49.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:30:49.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:30:49.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:30:49.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:30:49.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:30:49.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:30:49.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:30:49.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:30:49.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:30:49.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:e2:a9:b2:79:7a:e1:b7:64:61:b6:a4:fc:25:3f:74:1c:63:35:0d]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:36:25.841  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:36:25.842 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:36:25.843 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:36:25.844 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:36:25.844  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:36:25.845  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:36:25.845  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:36:25.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:36:25.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:36:25.846 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:36:25.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:36:25.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:36:25.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:36:25.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:36:25.944  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:36:25.944  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:36:25.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:36:25.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:36:25.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:36:25.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:36:25.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:36:25.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:36:25.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:36:25.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:36:25.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:36:25.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:36:25.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:36:25.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:36:25.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:36:25.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:36:25.955 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:45:51:47:9e:67:f4:66:14:67:2d:d7:3b:a5:3c:5b:02:54:35:fe]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:36:50.857  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:36:50.858 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:36:50.859 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-10 03:36:50.859 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:36:50.859  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-10 03:36:50.860  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:36:50.860  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:36:50.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:36:50.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:36:50.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:36:50.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:36:50.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:36:50.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:36:50.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:36:50.955  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:36:50.956  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:36:50.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:36:50.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:36:50.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:36:50.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:36:50.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:36:50.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:36:50.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:36:50.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:36:50.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:36:50.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:36:50.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:36:50.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:36:50.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:36:50.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:36:50.963 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:0d:b3:10:52:d1:a4:ea:c7:68:42:2e:c2:79:a5:77:85:ea:41:19]
            modulus: b2baaeae453189215c7d9eb79e70ddaf578cefd4354c58ca07f2744a25365f5c07bf4354765ce635fc7ce1fe260897c3b88c16ff764947f95768d3cf59eb1e817190059e363e9cec885ac22c9232d3f997255f80ac8dcece9b7418f3cfadb4df4a4601acb8198010de3336bb45fa8f50cb3442123d80ff4e96f1811ba40bc04f9bb53d7aec019ba7d2454db2318510dbeb4c55abc307e327aad2256ca6098c60ad1abc482755ca91787d881d52af4c14ade1d47631fc04147c3d7f2ea2c1b45052658328e060f7ca15341245954cfac59aba45f4cab80a9100236689f75532cf5fe18d6a4131a3cce50138776a8805b4ad1369b7c8e7fd1ef3fceb8100dfbf3f
    public exponent: 10001

] 
2022-05-10 03:37:53.084  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:37:53.085 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:37:53.087 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-10 03:37:53.087 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:37:53.087  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-10 03:37:53.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:37:53.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:37:53.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:37:53.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:37:53.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:37:53.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:37:53.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:37:53.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:37:53.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:37:53.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:37:53.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:37:53.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:37:53.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:37:53.183  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:37:53.183  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:37:53.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:37:53.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:37:53.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:37:53.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:37:53.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:37:53.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:37:53.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:37:53.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:37:53.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:37:53.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:37:53.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:36:b9:e4:3f:70:4f:d7:25:ff:44:5f:06:f9:41:24:20:8a:e2:ac]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:40:30.598  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:40:30.599 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:40:30.600 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:40:30.600 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:40:30.600  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:40:30.601  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:40:30.601  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:40:30.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:40:30.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:40:30.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:40:30.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:40:30.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:40:30.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:40:30.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:40:30.687  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:40:30.688  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:40:30.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:40:30.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:40:30.690  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:40:30.690  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:40:30.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:40:30.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:40:30.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:40:30.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:40:30.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:40:30.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:40:30.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:40:30.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:40:30.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:40:30.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:40:30.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:45:71:f5:86:2e:41:67:0f:f4:7c:e7:d5:34:70:3b:cf:b9:25:2a]
            modulus: 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
    public exponent: 10001

] 
2022-05-10 03:45:31.462  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:45:31.464 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:45:31.465 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:45:31.466 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:45:31.466  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:45:31.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:45:31.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:45:31.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:45:31.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:45:31.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:45:31.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:45:31.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:45:31.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:45:31.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:45:31.568  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:45:31.568  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:45:31.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:45:31.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:45:31.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:45:31.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:45:31.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:45:31.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:45:31.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:45:31.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:45:31.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:45:31.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:45:31.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:45:31.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:45:31.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:45:31.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:45:31.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:b6:00:10:c7:c6:e3:ff:2a:6c:2f:7c:34:94:0b:33:1d:d0:fd:ff]
            modulus: c6419a2e2e8dfbb8fb6af36add37dbd4eeff2534d6acb9e0cde1ddd013664407c13cf41f4044395c679de821831aa9b3a34536eea7bb2dc92ca66901ecc1dc8b2bcf18e2952e0ed8b1b51325086310c22f896910d1d1217d9d4e6fb15d2e8ac08552eac02d6ae5cd136b493281b844f83cbbe91dd26c96ccbb144bce6f812200ccca61b203f0a7445f8b8fb59eeb3e74030786c2e901eee605a8f5fbc0b6545c91f9c43a28dbac9debc75263fe3da608fc888750222862134c4668609b003a9b1341817e9571f3369a96f71a1aaaa12d6022b59b6b1628ae84217af416c99b5589edcfac5587f92a0f5b9700f37495dbcd37bb644a47d66c7eeb6405aaec33df
    public exponent: 10001

] 
2022-05-10 03:52:17.754  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-10 03:52:17.755 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-10 03:52:17.757 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:52:17.757 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-10 03:52:17.758  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-10 03:52:17.758  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-10 03:52:17.758  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-10 03:52:17.759 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-10 03:52:17.759 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-10 03:52:17.759 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-10 03:52:17.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-10 03:52:17.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:52:17.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-10 03:52:17.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:52:17.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-10 03:52:17.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-10 03:52:17.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-10 03:52:17.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-10 03:52:17.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-10 03:52:17.860  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-10 03:52:17.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:52:17.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:52:17.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:52:17.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:52:17.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:52:17.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:52:17.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-10 03:52:17.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-10 03:52:17.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-10 03:52:17.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-10 03:52:17.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 287620075803807330223913870214619178874588095186
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 10 01:41:00 UTC 2022
           Final Date: Sun May 09 01:40:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0b:38:49:23:2b:b8:72:f4:85:f4:3e:4c:f7:33:cd:f2:2c:a0:ea:d5]
            modulus: 887a7da0d00b23f7e667e135650aa8422969362a71ae2fdc1979023c342ee90c56a657817589dba892add7a3e4bf8776e76abbe2904991631278defce37f76fe3d76d1cbebf6d858af38adddad40069b6701067a980be9290613bc314925c0bed185517747d6e11c1ab105bb2715ca7c6d01c6356dc77c123d715ea530c70e0178c9a8f7308feb7cba0caad371dcf948486d6b826860afd33696390bd8e0eaed320eb8d362fb0ec0a74c2665a399cef0fa9e88256100d8d8228da43b013fc78c8e61a23998e9300906ed7e6cba45dc0e24d2b12f44de10636a4e4f17e99213e4618b781d5d11e2fe37f5f48faabdc8f657eab11afaa3cf7aed86f41d919c9a8869bf28f2cdef3499ed18dcbfcf8fa956bcc7dd71631c67fe211dd70428eb0bcf40de486937367cce21cc5b20488f4c55e1d232f305902eaf12a4b5771f0b20d858b2bff3b1545414e19b98f52ab1f8b7b58e538aaef4a63617b0e80d3a0e8e6fe1af872a5c4813ac647b60abf42619736c4580be503d15a3ac82bd5b93d80c23
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 56ba263b676257830a8ee01e9dd92542d0d27deb
                       d20a1731e260e4048bcca29d92c967afce5811ac
                       f07c6828d92ea329841bca7b9e9368088a9c78d2
                       6c07fc916a34eb9acb754635ef3b80025b9ee906
                       79e1693efac3a7abe55d01a89cdbee6d20231856
                       382cf2f7b4ec83217a9fa70d8261ac3eeeaf7907
                       f53f24113d581d436003f5febb20eafddfaf2fa4
                       c573911a31100277d213505fa1c151915b42037c
                       716c5647be85d16baa5b373a4614640f339ecfa7
                       02536ff938382405e2e7c63bb86aecf3a468ee08
                       5ba35a2fed624d21528ca868fa29e7232d5033ee
                       f518942884acd8cee0f988af273294192bb5ce52
                       5ffc2878edd3ba6978d9271805412c7022d17fff
                       6fdc6055269daa168808ab7639ef4eb67b6e7a45
                       240e08d529ddc9e2320cdfb5e452bc907968068f
                       6bc8ca51c5aabe500e0433bd5ce2babc354a3589
                       6424bc8fb4051b6a7514c6dfd2a2aad0224cd063
                       85ff4110e49e88d46934a243d4e7ebf3cdb2adf6
                       0f56f137128720ccaa68536cd5c71fd0bd22cdb2
                       bab74105
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:c9:56:50:8f:35:4a:bb:47:67:28:0b:e0:bf:0d:dc:56:22:54:38]
            modulus: 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
    public exponent: 10001

]