Results

By type

          2022-05-17 02:17:19,058 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-17 02:17:23,945 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-17 02:17:27.054  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 17, 2022 2:17:36 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 17, 2022 2:17:36 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 17, 2022 2:17:36 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 17, 2022 2:17:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-17 02:17:39.371 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-17 02:17:40.465  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-17 02:17:41.253  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-17 02:17:44.162 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-17 02:17:44.164 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-17 02:17:44.165 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-17 02:17:44.246 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-17 02:17:44.362 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-17 02:17:44.364 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-17 02:17:44.861 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-17 02:17:49.261 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 17, 2022 2:17:52 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-17 02:17:53.251  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.098 seconds (JVM running for 46.202)
May 17, 2022 2:17:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-17 02:18:44.859  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 02:18:44.865 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 02:18:45.055 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-17 02:18:45.059 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 02:18:45.158  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-17 02:18:45.161  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 02:18:45.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 02:18:45.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 02:18:45.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 02:18:45.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 02:18:45.171 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 02:18:45.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 02:18:45.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 02:18:45.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 02:18:45.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 02:18:45.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 02:18:46.771  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 02:18:46.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 02:18:46.773 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 02:18:46.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 02:18:46.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 02:18:46.782  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 02:18:46.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 02:18:46.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 02:18:46.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 02:18:46.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 02:18:46.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 02:18:46.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 02:18:46.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 02:18:46.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 02:18:46.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 02:18:46.860 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 02:18:47.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:d6:fc:f3:43:ec:67:1b:bc:76:27:16:e2:d4:e6:ce:29:89:b1:68]
            modulus: b6954aa6cc46d1154fc954a06b7a3002e3d94472b56fcc2e14fcd148e448ab83e23e923c3ceeab31e8741f00a7ad53aea8bed125baa298f165040da57fa354e61b2a5bbffd2a85e9dbe36ab433f5ed2a7deb3caf603b38d3cde6175be08437655a1585e53f54cb820629c4d4c9c8b2c669edc53a153e1fbb1c726e0d07d5dbaacb40f8263dcdebd8dd1597a4ca266c5872899e861f8f73f7f6f0da70005d424e143b9302a262fd8f237af77965d98e19bd6487032efdb287a05efb2e26ee3ee00f25319c7d8c8203ea8cf94a3945694770d2128cfdf1da7573d5b19645ec6394d278ca437b8631487f48d84e4ce8374da003a98d1f508df8cb6220ff3bfffc83
    public exponent: 10001

] 
2022-05-17 04:03:52.214  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:03:52.216 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:03:52.219 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:03:52.220 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:03:52.222  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:03:52.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:03:52.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:03:52.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:03:52.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:03:52.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:03:52.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:03:52.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:03:52.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:03:52.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:03:52.481  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:03:52.482  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:03:52.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:03:52.483 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:03:52.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:03:52.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:03:52.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:03:52.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:03:52.488 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:03:52.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:03:52.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:03:52.490 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:03:52.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:03:52.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:03:52.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:03:52.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:03:52.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: dc5abde8e2b0cd670ea54d14e7c04eeac356310aa001b3d00650b6f48ae7929a1ff0a6cd0378a2766769f0a75d20985b619287ab7b5880584a6d2e6429c521aea5fccc5b1e7b8b0efaed0df310045d32865205fe097fc198294c97b6fb0f1d614240449e70e6d418cae20213e508960b4611a2e823f2118c746c67e5e4076ad3fdaee6402df072ade78d0e657dd64e014012e0b41a137ea8fea1f5ab7d8dfb06987e978dcfdfd36962de383999e01e2cc6aa12c2dc0ee63332f8c8c5ed3a682bd609347a3de35311d2cd742f0de14a68fc9bf48963d3da27459d25944d4078f65933e99b5e6b80f0865541f2cd8aaead19ca2acd97a487ca769eab38e964da9b4ad63af69e3a610994b789e6de0d7dbcfbf5731d311158e5b84b91c3799dc2aee4de032deb257325b211165b8e9e6dfbe562a03770437586b1dbbf6824d2e710edb1be86aeff71d15e2ba4f0d940ff3ef8c49ffbd196dc4814c1e63902a45940afa4da7a2eec4d54004bf2951aed4175c4cea66c56c84728136ce3439afb1d47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:4e:ec:66:3d:94:d5:51:33:e3:ad:56:7f:02:7e:ed:4f:2c:ef:9d]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:07:39.208  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:07:39.210 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:07:39.213 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:07:39.214 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:07:39.215  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:07:39.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:07:39.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:07:39.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:07:39.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:07:39.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:07:39.253 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:07:39.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:07:39.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:07:39.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:07:39.442  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:07:39.443  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:07:39.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:07:39.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:07:39.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:07:39.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:07:39.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:07:39.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:07:39.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:07:39.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:07:39.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:07:39.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:07:39.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:07:39.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:07:39.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:07:39.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:07:39.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: dc5abde8e2b0cd670ea54d14e7c04eeac356310aa001b3d00650b6f48ae7929a1ff0a6cd0378a2766769f0a75d20985b619287ab7b5880584a6d2e6429c521aea5fccc5b1e7b8b0efaed0df310045d32865205fe097fc198294c97b6fb0f1d614240449e70e6d418cae20213e508960b4611a2e823f2118c746c67e5e4076ad3fdaee6402df072ade78d0e657dd64e014012e0b41a137ea8fea1f5ab7d8dfb06987e978dcfdfd36962de383999e01e2cc6aa12c2dc0ee63332f8c8c5ed3a682bd609347a3de35311d2cd742f0de14a68fc9bf48963d3da27459d25944d4078f65933e99b5e6b80f0865541f2cd8aaead19ca2acd97a487ca769eab38e964da9b4ad63af69e3a610994b789e6de0d7dbcfbf5731d311158e5b84b91c3799dc2aee4de032deb257325b211165b8e9e6dfbe562a03770437586b1dbbf6824d2e710edb1be86aeff71d15e2ba4f0d940ff3ef8c49ffbd196dc4814c1e63902a45940afa4da7a2eec4d54004bf2951aed4175c4cea66c56c84728136ce3439afb1d47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:a2:52:6a:40:4e:dc:20:bc:70:fd:4a:4a:b8:1a:0d:d2:d5:b2:e8]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:09:54.397  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:09:54.398 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:09:54.400 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-17 04:09:54.401 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:09:54.401  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-17 04:09:54.402  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:09:54.402  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:09:54.402 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:09:54.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:09:54.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:09:54.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:09:54.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:09:54.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:09:54.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:09:54.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:09:54.546  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:09:54.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:09:54.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:09:54.547  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:09:54.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:09:54.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:09:54.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:09:54.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:09:54.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:09:54.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:09:54.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:09:54.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:09:54.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:09:54.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:09:54.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:09:54.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:dc:da:6d:fa:8a:e3:fa:e0:08:68:f0:95:50:85:9f:11:21:10:bf]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:12:44.331  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:12:44.333 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:12:44.335 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-17 04:12:44.336 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:12:44.337  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-17 04:12:44.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:12:44.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:12:44.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:12:44.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:12:44.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:12:44.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:12:44.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:12:44.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:12:44.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:12:44.447  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:12:44.447  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:12:44.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:12:44.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:12:44.450  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:12:44.450  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:12:44.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:12:44.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:12:44.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:12:44.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:12:44.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:12:44.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:12:44.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:12:44.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:12:44.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:12:44.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:12:44.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: dc5abde8e2b0cd670ea54d14e7c04eeac356310aa001b3d00650b6f48ae7929a1ff0a6cd0378a2766769f0a75d20985b619287ab7b5880584a6d2e6429c521aea5fccc5b1e7b8b0efaed0df310045d32865205fe097fc198294c97b6fb0f1d614240449e70e6d418cae20213e508960b4611a2e823f2118c746c67e5e4076ad3fdaee6402df072ade78d0e657dd64e014012e0b41a137ea8fea1f5ab7d8dfb06987e978dcfdfd36962de383999e01e2cc6aa12c2dc0ee63332f8c8c5ed3a682bd609347a3de35311d2cd742f0de14a68fc9bf48963d3da27459d25944d4078f65933e99b5e6b80f0865541f2cd8aaead19ca2acd97a487ca769eab38e964da9b4ad63af69e3a610994b789e6de0d7dbcfbf5731d311158e5b84b91c3799dc2aee4de032deb257325b211165b8e9e6dfbe562a03770437586b1dbbf6824d2e710edb1be86aeff71d15e2ba4f0d940ff3ef8c49ffbd196dc4814c1e63902a45940afa4da7a2eec4d54004bf2951aed4175c4cea66c56c84728136ce3439afb1d47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:1b:e4:a6:16:f6:ec:d4:aa:c1:bd:d3:4a:eb:3a:c4:3c:ae:eb:68]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:18:24.576  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:18:24.579 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:18:24.581 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:18:24.582 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:18:24.583  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:18:24.584  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:18:24.584  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:18:24.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:18:24.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:18:24.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:18:24.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:18:24.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:18:24.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:18:24.646 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:18:24.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:18:24.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:18:24.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:18:24.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:18:24.743  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:18:24.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:18:24.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:18:24.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:18:24.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:18:24.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:18:24.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:18:24.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:18:24.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:18:24.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:18:24.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:18:24.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:18:24.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:df:33:61:b3:74:f8:3a:75:a1:ff:92:88:01:25:a4:3d:c8:b3:79]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:24:22.237  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:24:22.237 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:24:22.239 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:24:22.239 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:24:22.239  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:24:22.239  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:24:22.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:24:22.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:24:22.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:24:22.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:24:22.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:24:22.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:24:22.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:24:22.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:24:22.336  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:24:22.336  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:24:22.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:24:22.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:24:22.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:24:22.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:24:22.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:24:22.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:24:22.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:24:22.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:24:22.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:24:22.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:24:22.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:24:22.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:24:22.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:24:22.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:24:22.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: dc5abde8e2b0cd670ea54d14e7c04eeac356310aa001b3d00650b6f48ae7929a1ff0a6cd0378a2766769f0a75d20985b619287ab7b5880584a6d2e6429c521aea5fccc5b1e7b8b0efaed0df310045d32865205fe097fc198294c97b6fb0f1d614240449e70e6d418cae20213e508960b4611a2e823f2118c746c67e5e4076ad3fdaee6402df072ade78d0e657dd64e014012e0b41a137ea8fea1f5ab7d8dfb06987e978dcfdfd36962de383999e01e2cc6aa12c2dc0ee63332f8c8c5ed3a682bd609347a3de35311d2cd742f0de14a68fc9bf48963d3da27459d25944d4078f65933e99b5e6b80f0865541f2cd8aaead19ca2acd97a487ca769eab38e964da9b4ad63af69e3a610994b789e6de0d7dbcfbf5731d311158e5b84b91c3799dc2aee4de032deb257325b211165b8e9e6dfbe562a03770437586b1dbbf6824d2e710edb1be86aeff71d15e2ba4f0d940ff3ef8c49ffbd196dc4814c1e63902a45940afa4da7a2eec4d54004bf2951aed4175c4cea66c56c84728136ce3439afb1d47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:5d:f4:a0:f8:19:ef:76:fc:3a:27:fd:f1:ea:5e:13:a7:b9:d0:f7]
            modulus: ba2145b1c46af6ef1c536a899e177502c62d83913299fd8701d106ddb9108eccc146502d666bf909307b5bd304a64df3a6a611d469a0f64dd11dfd18e2b22230e8f3b7e10592229dea3d91f806b461d306eabd699936cad19b0be0148bf6e9e26da5d5dd62c04af5bf6a181c3c9d205e235ec41e52322537a6643d137a24e3e835a1ba8dcbb18e3921399e36c20a8e3d6fedac87e166122e0f5cfceceda58e7c941b77dcd79190e9096b09f2bdaa86f5493020d37fcefe161bfdb806fcb043792704f97e8fe46e6f1a27363a1f43f692c7a1b5834e92acb379ff88ff4ba8d5bbfd1dae14bf0c0b2e642e59b723d308adb21374611d0a84304bb91bede6414b0f
    public exponent: 10001

] 
2022-05-17 04:31:44.748  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:31:44.750 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:31:44.752 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:31:44.753 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:31:44.754  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:31:44.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:31:44.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:31:44.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:31:44.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:31:44.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:31:44.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:31:44.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:31:44.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:31:44.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:31:44.849  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:31:44.850  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:31:44.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:31:44.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:31:44.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:31:44.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:31:44.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:31:44.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:31:44.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:31:44.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:31:44.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:31:44.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:31:44.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:31:44.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:31:44.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:31:44.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:31:44.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:d0:02:d9:d7:ff:75:3c:54:00:e5:21:ea:a6:30:21:0f:b0:0e:4d]
            modulus: ce57e01a67809d9576ca70f171ff72c94f25e02255360ddcd4e66210c142e687bb36b4f10dc11809d54859ff57af985d13cc37de0ec36b8744d9c3eff16189f4f3aa5591c25d3889370af8de7738963424f5a984fe3f5e56463d8e74f203d8dfb013d851da45201429280a694b5c01f01dd8ab6fe1e4d49a8d70835cf22451aa891ebae5ff6e1d9d007df45ced7b8806355fa82552c100d25e5f44f57690e54b591466fe65d04bde261af8fd453887a1e16b6b3467bcc325852787513dd79f64467cd0f19716e49a606dc1921777ef537572fa912c430c2fe97130a67030caf076270cd8885a1707a989b2fc71f861ec5c4d2550e6e07ad266ba7cb7455e8367
    public exponent: 10001

] 
2022-05-17 04:36:26.807  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:36:26.809 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:36:26.812 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-17 04:36:26.813 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:36:26.814  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-17 04:36:26.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:36:26.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:36:26.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:36:26.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:36:26.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:36:26.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:36:26.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:36:26.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:36:26.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:36:26.912  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:36:26.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:36:26.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:36:26.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:36:26.915  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:36:26.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:36:26.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:36:26.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:36:26.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:36:26.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:36:26.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:36:26.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:36:26.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:36:26.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:36:26.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:36:26.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:36:26.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:ac:53:56:28:0c:59:79:8d:27:59:e4:ed:88:ca:11:19:b3:b7:d5]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:38:09.149  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:38:09.151 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:38:09.152 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:38:09.153 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:38:09.153  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:38:09.154  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:38:09.154  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:38:09.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:38:09.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:38:09.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:38:09.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:38:09.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:38:09.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:38:09.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:38:09.250  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:38:09.251  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:38:09.251 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:38:09.251 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:38:09.252  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:38:09.252  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:38:09.252 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:38:09.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:38:09.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:38:09.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:38:09.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:38:09.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:38:09.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:38:09.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:38:09.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:38:09.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:38:09.256 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:43:94:2f:34:c1:e5:0b:98:a8:c5:28:5c:7e:b0:67:92:b3:2d:4d]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:44:24.129  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:44:24.131 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:44:24.132 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:44:24.132 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:44:24.132  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:44:24.133  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:44:24.133  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:44:24.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:44:24.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:44:24.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:44:24.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:44:24.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:44:24.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:44:24.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:44:24.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:44:24.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:44:24.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:44:24.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:44:24.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:44:24.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:44:24.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:44:24.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:44:24.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:44:24.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:44:24.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:44:24.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:44:24.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:44:24.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:44:24.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:44:24.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:44:24.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:43:0d:f1:10:27:92:ba:6f:e0:6b:00:b5:bb:1e:e4:b5:26:c2:95]
            modulus: a0c354abf164086692c341dcaff4e70cc20ae217fd10567148efd8bf03de6a0e34354757b0c5abd35ad51353af86017e44f94db25b74c79dcdaba1a892c38424da22a3800a02188d26536d20f21820aaba2427e3267fe52d894b8d41e32dfa6818433df719562ba426c71f46121687a6558f2f5933d15d7a16b92388eb4ab40a39d7b6db77488f6441f5c7e0324aede486ce9bd113420b07811b070151ca5e03773d647b62e288f7cb5a16e77229ad081b83b1d9d009e548dc9309666880a130788e7c82424ab402f6fbb2dfd1685be5687de0c35fd10cd6043bad7813a6395130565d11ea96f021f83223e2d47d4c1edd0a784faf5fbce7c2d053c3cf559a0d
    public exponent: 10001

] 
2022-05-17 04:46:22.162  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:46:22.163 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:46:22.164 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-17 04:46:22.164 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:46:22.164  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-17 04:46:22.165  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:46:22.165  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:46:22.165 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:46:22.165 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:46:22.165 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:46:22.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:46:22.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:46:22.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:46:22.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:46:22.261  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:46:22.261  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:46:22.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:46:22.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:46:22.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:46:22.264  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:46:22.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:46:22.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:46:22.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:46:22.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:46:22.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:46:22.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:46:22.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:46:22.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:46:22.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:46:22.268 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:46:22.271 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:ae:af:f4:ed:c8:bf:1f:30:17:f0:4c:aa:92:fd:31:7a:a5:bc:78]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:47:42.523  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:47:42.524 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:47:42.525 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-17 04:47:42.526 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:47:42.526  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-17 04:47:42.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:47:42.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:47:42.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:47:42.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:47:42.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:47:42.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:47:42.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:47:42.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:47:42.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:47:42.632  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:47:42.632  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:47:42.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:47:42.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:47:42.634  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:47:42.639  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:47:42.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:47:42.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:47:42.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:47:42.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:47:42.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:47:42.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:47:42.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:47:42.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:47:42.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:47:42.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:47:42.645 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:25:2f:f7:e8:09:87:49:67:fc:4b:72:3e:9b:c3:b5:14:f8:ad:d9]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 04:51:58.401  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 04:51:58.403 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 04:51:58.404 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:51:58.405 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 04:51:58.405  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 04:51:58.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 04:51:58.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 04:51:58.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 04:51:58.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 04:51:58.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 04:51:58.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 04:51:58.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:51:58.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 04:51:58.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:51:58.506  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 04:51:58.507  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 04:51:58.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 04:51:58.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 04:51:58.509  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 04:51:58.510  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 04:51:58.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:51:58.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:51:58.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:51:58.511 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:51:58.512 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:51:58.512 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:51:58.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 04:51:58.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 04:51:58.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 04:51:58.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 04:51:58.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:53:68:4b:ba:b1:91:77:07:72:4b:e1:42:61:6c:5f:75:c0:0c:0a]
            modulus: a441640f896af519a645fbb963721c1c444e127798934ff8b348482c9880147a43b7c963f30c84c7bf01b23a7bff10e1297fda29118ec140a302105b4dad13828cb2f37c814f60f61e4953cbcf3dc59b968f387070b9041889c826780d9e98faf077865f671be2a85805551f109d2d50c021ad7b520eefc662679eaff3ff1e6ac5146371800ed81c87be8282455ce043150033ea315163cdbcb16595a01d15981ffbdf58b41f1b818e2e06309325523402eeb0ed4b6c035390ec3f5fc11b37fa3012c0855ed9e839a489769345f4205b9670aa68f5f992305ea61b00e5548b673aa8dca055d8d9629a1e14b83426475961e2569724a0d048a5989edea91536e7
    public exponent: 10001

] 
2022-05-17 05:02:37.705  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 05:02:37.706 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 05:02:37.707 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 05:02:37.708 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 05:02:37.708  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 05:02:37.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 05:02:37.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 05:02:37.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 05:02:37.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 05:02:37.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 05:02:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 05:02:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:02:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:02:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:02:37.814  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 05:02:37.814  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 05:02:37.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 05:02:37.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:02:37.815  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 05:02:37.816  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 05:02:37.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:02:37.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:02:37.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:02:37.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:02:37.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:02:37.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:02:37.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:02:37.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:02:37.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:02:37.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 05:02:37.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:45:27:72:80:d3:a7:3c:9c:82:58:e3:fb:6f:ed:f6:51:be:9f:38]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 05:09:33.954  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 05:09:33.955 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 05:09:33.957 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-17 05:09:33.958 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 05:09:33.958  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-17 05:09:33.958  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 05:09:33.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 05:09:33.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 05:09:33.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 05:09:33.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 05:09:33.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 05:09:33.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:09:33.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:09:33.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:09:34.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 05:09:34.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 05:09:34.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 05:09:34.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:09:34.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 05:09:34.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 05:09:34.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:09:34.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:09:34.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:09:34.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:09:34.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:09:34.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:09:34.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:09:34.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:09:34.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:09:34.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 05:09:34.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:42:53:c8:23:e1:1e:88:fb:e0:51:b0:5e:c9:8b:e7:9f:37:d0:5b]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 05:09:42.084  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 05:09:42.085 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 05:09:42.087 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 05:09:42.087 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 05:09:42.087  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 05:09:42.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 05:09:42.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 05:09:42.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 05:09:42.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 05:09:42.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 05:09:42.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 05:09:42.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:09:42.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:09:42.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:09:42.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 05:09:42.245  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 05:09:42.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 05:09:42.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:09:42.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 05:09:42.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 05:09:42.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:09:42.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:09:42.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:09:42.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:09:42.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:09:42.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:09:42.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:09:42.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:09:42.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:09:42.249 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 05:09:42.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: dc5abde8e2b0cd670ea54d14e7c04eeac356310aa001b3d00650b6f48ae7929a1ff0a6cd0378a2766769f0a75d20985b619287ab7b5880584a6d2e6429c521aea5fccc5b1e7b8b0efaed0df310045d32865205fe097fc198294c97b6fb0f1d614240449e70e6d418cae20213e508960b4611a2e823f2118c746c67e5e4076ad3fdaee6402df072ade78d0e657dd64e014012e0b41a137ea8fea1f5ab7d8dfb06987e978dcfdfd36962de383999e01e2cc6aa12c2dc0ee63332f8c8c5ed3a682bd609347a3de35311d2cd742f0de14a68fc9bf48963d3da27459d25944d4078f65933e99b5e6b80f0865541f2cd8aaead19ca2acd97a487ca769eab38e964da9b4ad63af69e3a610994b789e6de0d7dbcfbf5731d311158e5b84b91c3799dc2aee4de032deb257325b211165b8e9e6dfbe562a03770437586b1dbbf6824d2e710edb1be86aeff71d15e2ba4f0d940ff3ef8c49ffbd196dc4814c1e63902a45940afa4da7a2eec4d54004bf2951aed4175c4cea66c56c84728136ce3439afb1d47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:5d:b8:45:86:bb:b7:4f:4a:f4:2d:86:05:e7:3e:ae:da:68:5d:3b]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 05:11:07.260  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 05:11:07.262 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 05:11:07.263 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-17 05:11:07.263 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 05:11:07.264  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-17 05:11:07.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 05:11:07.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 05:11:07.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 05:11:07.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 05:11:07.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 05:11:07.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 05:11:07.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:11:07.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:11:07.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:11:07.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 05:11:07.355  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 05:11:07.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 05:11:07.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:11:07.356  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 05:11:07.356  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 05:11:07.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:11:07.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:11:07.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:11:07.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:11:07.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:11:07.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:11:07.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:11:07.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:11:07.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:11:07.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 05:11:07.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 533321773963434958800848294616483804218496210815
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 02:14:06 UTC 2022
           Final Date: Sun May 16 02:14:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:b7:53:b4:f4:5e:9d:43:a2:e4:2e:13:d7:68:92:d3:f3:9a:fa:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3f9efa7e5780de5e5caafe5cae2c1a07e3578cb8
                       9e17e101aeda9c1ea927337acd27ab37b65bf931
                       1c4a65cf673c4fa417574b5b02cd38661cdfb0ee
                       598c13bfffbb11161c910be8923872078e78654d
                       8ba0b51bd9b8872d51e05c646cfad3590b529347
                       6f30af4d066dfbb28600640dd101d3afbdad48a7
                       31ee2e2110ee3d2686f462246133e18b95e6f407
                       3f0596dbd89fce3bda38575646be5a15be4b2f68
                       a1ad7eb00d87b0a19398950381b26410e26d12cd
                       9a3aa1c5b30eae7984dee04811a906509a671f0e
                       8077ebba129b009631230352afadc61c00f65d20
                       ef55dc76ccf5c6e3acfc8f290bd388e9910944e2
                       0105d752a1b5e3205ad676334f682a4908dd0561
                       1e8bf03604ab0fc20bb96158a76e49937f54c18b
                       67ab8a812b9af9b8efd0ad2234d16c691c998536
                       92b493870319d2aee9017a90b6538eeb2f5e91ad
                       d8405db1a53f05370a097d7377fd11ff91417541
                       afc8e41aa7b3665f136794cb69921d835e821256
                       b242bd6b43fa18c68836d740cbbe3e6959b34592
                       680d0e81
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:00:9a:67:35:a3:8e:55:10:e6:9b:dd:36:7e:81:81:fe:63:93:e9]
            modulus: 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
    public exponent: 10001

]