Results

By type

          2022-05-25 10:19:54,450 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-25 10:19:58,852 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-25 10:20:01.949  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 25, 2022 10:20:11 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 25, 2022 10:20:11 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 25, 2022 10:20:11 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 25, 2022 10:20:12 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-25 10:20:14.062 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-25 10:20:15.354  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-25 10:20:16.061  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-25 10:20:19.263 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-25 10:20:19.266 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-25 10:20:19.267 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-25 10:20:19.270 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-25 10:20:19.550 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-25 10:20:19.555 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-25 10:20:20.163 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-25 10:20:24.852 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 25, 2022 10:20:27 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-25 10:20:29.267  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.604 seconds (JVM running for 47.002)
May 25, 2022 10:20:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-25 10:22:44.161  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:22:44.254 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:22:44.365 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 10:22:44.367 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:22:44.452  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 10:22:44.455  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:22:44.456  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:22:44.458 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:22:44.458 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:22:44.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:22:44.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:22:44.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:22:44.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:22:44.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:22:44.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:22:44.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:22:46.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:22:46.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:22:46.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:22:46.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:22:46.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:22:46.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:22:46.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:22:46.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:22:46.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:22:46.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:22:46.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:22:46.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:22:46.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:22:46.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:22:46.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:22:46.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:22:46.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:aa:c1:e8:e3:ff:14:e4:a9:f8:4f:c4:ad:ba:14:aa:69:a1:b1:92]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 16:47:18.629  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 16:47:18.631 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 16:47:18.635 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 16:47:18.636 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 16:47:18.637  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 16:47:18.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 16:47:18.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 16:47:18.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 16:47:18.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 16:47:18.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 16:47:18.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 16:47:18.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:47:18.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:47:18.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:47:18.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 16:47:18.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 16:47:18.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 16:47:18.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:47:18.903  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 16:47:18.949  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 16:47:18.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:47:18.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:47:18.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:47:18.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:47:18.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:47:18.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:47:18.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:47:18.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:47:18.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:47:18.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 16:47:19.050 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:ea:d5:c4:f5:ea:a7:74:4a:6e:32:f4:e6:b0:6a:3f:bd:e1:a4:1a]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 16:51:34.568  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 16:51:34.570 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 16:51:34.572 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 16:51:34.573 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 16:51:34.573  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 16:51:34.574  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 16:51:34.575  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 16:51:34.575 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 16:51:34.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 16:51:34.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 16:51:34.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 16:51:34.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:51:34.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:51:34.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:51:34.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 16:51:34.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 16:51:34.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 16:51:34.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:51:34.753  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 16:51:34.754  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 16:51:34.754 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:51:34.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:51:34.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:51:34.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:51:34.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:51:34.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:51:34.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:51:34.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:51:34.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:51:34.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 16:51:34.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:1a:3c:53:05:a0:24:0b:92:85:4e:da:4d:70:37:eb:d1:75:1d:ca]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 16:53:46.311  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 16:53:46.312 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 16:53:46.314 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 16:53:46.315 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 16:53:46.315  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 16:53:46.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 16:53:46.317  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 16:53:46.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 16:53:46.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 16:53:46.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 16:53:46.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 16:53:46.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:53:46.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:53:46.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:53:46.503  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 16:53:46.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 16:53:46.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 16:53:46.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:53:46.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 16:53:46.508  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 16:53:46.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:53:46.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:53:46.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:53:46.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:53:46.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:53:46.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:53:46.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:53:46.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:53:46.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:53:46.512 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 16:53:46.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:f1:1b:37:62:6b:db:69:b5:58:22:0b:8c:a6:5e:b3:b5:09:c2:4b]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 16:56:51.093  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 16:56:51.095 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 16:56:51.097 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 16:56:51.097 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 16:56:51.098  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 16:56:51.099  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 16:56:51.099  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 16:56:51.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 16:56:51.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 16:56:51.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 16:56:51.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 16:56:51.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:56:51.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:56:51.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:56:51.249  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 16:56:51.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 16:56:51.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 16:56:51.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:56:51.252  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 16:56:51.253  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 16:56:51.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:56:51.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:56:51.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:56:51.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:56:51.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:56:51.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:56:51.257 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:56:51.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:56:51.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:56:51.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 16:56:51.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:d4:b9:dc:a9:30:00:f8:6d:51:f5:a1:89:c8:20:05:45:1b:72:d9]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 16:59:27.411  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 16:59:27.412 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 16:59:27.414 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-25 16:59:27.415 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 16:59:27.415  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-25 16:59:27.416  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 16:59:27.416  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 16:59:27.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 16:59:27.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 16:59:27.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 16:59:27.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 16:59:27.424 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:59:27.424 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 16:59:27.424 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:59:27.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 16:59:27.521  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 16:59:27.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 16:59:27.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 16:59:27.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 16:59:27.524  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 16:59:27.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:59:27.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:59:27.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:59:27.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:59:27.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:59:27.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:59:27.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 16:59:27.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 16:59:27.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 16:59:27.528 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 16:59:27.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: b9c89ab369a1714bdc88e75668b32fc82e43d62421b02a301c9538793096d3af448f8e853d767fbdbffa145cddb23a25b8ead3781f39e52f0492584674d13c623e8a5031ad447bcadb73149aff0f1d4bc9c9206d0ec5c750377c5b5171a8a3eae2e573d9c8f4adde06f7325932646e13c18835aa4b128bf4279fbd09daf9d174a6c100b792c91c01dd9e8442a307d3c7962a7c408b14aa50f1d1d31ba9933dcde18029a441d0d3d662fafd7e9e48f56d111838e8a829462e095e816253bda1553b4061f684d68ff16f2ead60b9f5ca59434244c43f324769a804f5b863a1cb65028eb30cbac991feb7861c9eb9bc1f25a93b2f55c0f6d7f12646fae2e2b5544d4fab77bfa29a312688e9d9ba98c48cfc019afb9edb346166f4d49d1e24778b9149233a6e419a8fc569932466a61f32f2c4bb056fe8fd5b4f9ecce183539dc4a243e2d478224c7a46665cb2bc3f7d6bf519fb81193fc45542e75a0ab97b52edf2698ffd6cd9ef75d00441eb8746699bbe52ef967b3119aee93a43ccd1b16493fd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:72:c4:bc:d8:5b:8e:99:4b:2b:2f:33:e0:6a:40:d8:7a:a6:91:96]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:00:21.794  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:00:21.795 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:00:21.796 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:00:21.796 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:00:21.796  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:00:21.797  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:00:21.797  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:00:21.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:00:21.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:00:21.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:00:21.802 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:00:21.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:00:21.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:00:21.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:00:21.895  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:00:21.895  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:00:21.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:00:21.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:00:21.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:00:21.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:00:21.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:00:21.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:00:21.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:00:21.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:00:21.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:00:21.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:00:21.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:00:21.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:00:21.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:00:21.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:00:21.904 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:f6:35:0d:cb:53:54:94:9e:cd:d2:b2:2c:99:5c:6d:fb:88:16:18]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:06:54.255  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:06:54.256 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:06:54.258 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:06:54.259 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:06:54.259  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:06:54.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:06:54.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:06:54.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:06:54.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:06:54.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:06:54.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:06:54.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:06:54.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:06:54.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:06:54.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:06:54.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:06:54.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:06:54.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:06:54.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:06:54.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:06:54.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:06:54.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:06:54.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:06:54.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:06:54.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:06:54.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:06:54.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:06:54.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:06:54.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:06:54.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:06:54.376 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:fa:05:50:be:27:4e:86:8b:cf:b6:b7:60:8a:aa:b5:c2:6d:a0:ee]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:12:26.279  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:12:26.281 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:12:26.282 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:12:26.282 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:12:26.282  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:12:26.283  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:12:26.283  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:12:26.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:12:26.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:12:26.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:12:26.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:12:26.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:12:26.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:12:26.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:12:26.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:12:26.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:12:26.390 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:12:26.390 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:12:26.391  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:12:26.392  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:12:26.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:12:26.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:12:26.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:12:26.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:12:26.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:12:26.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:12:26.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:12:26.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:12:26.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:12:26.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:12:26.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: b9c89ab369a1714bdc88e75668b32fc82e43d62421b02a301c9538793096d3af448f8e853d767fbdbffa145cddb23a25b8ead3781f39e52f0492584674d13c623e8a5031ad447bcadb73149aff0f1d4bc9c9206d0ec5c750377c5b5171a8a3eae2e573d9c8f4adde06f7325932646e13c18835aa4b128bf4279fbd09daf9d174a6c100b792c91c01dd9e8442a307d3c7962a7c408b14aa50f1d1d31ba9933dcde18029a441d0d3d662fafd7e9e48f56d111838e8a829462e095e816253bda1553b4061f684d68ff16f2ead60b9f5ca59434244c43f324769a804f5b863a1cb65028eb30cbac991feb7861c9eb9bc1f25a93b2f55c0f6d7f12646fae2e2b5544d4fab77bfa29a312688e9d9ba98c48cfc019afb9edb346166f4d49d1e24778b9149233a6e419a8fc569932466a61f32f2c4bb056fe8fd5b4f9ecce183539dc4a243e2d478224c7a46665cb2bc3f7d6bf519fb81193fc45542e75a0ab97b52edf2698ffd6cd9ef75d00441eb8746699bbe52ef967b3119aee93a43ccd1b16493fd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:5a:23:41:6b:d6:a4:c4:6b:43:2b:31:63:c7:8d:f5:e7:1d:0f:1c]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:15:18.925  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:15:18.926 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:15:18.927 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 17:15:18.928 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:15:18.928  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 17:15:18.928  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:15:18.929  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:15:18.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:15:18.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:15:18.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:15:18.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:15:18.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:15:18.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:15:18.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:15:19.044  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:15:19.045  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:15:19.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:15:19.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:15:19.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:15:19.048  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:15:19.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:15:19.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:15:19.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:15:19.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:15:19.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:15:19.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:15:19.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:15:19.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:15:19.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:15:19.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:15:19.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:a8:2e:93:00:54:f5:7f:b2:99:d3:6e:55:89:1c:51:c8:61:7b:6f]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:16:49.262  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:16:49.263 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:16:49.264 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 17:16:49.265 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:16:49.265  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 17:16:49.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:16:49.266  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:16:49.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:16:49.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:16:49.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:16:49.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:16:49.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:16:49.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:16:49.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:16:49.364  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:16:49.365  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:16:49.365 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:16:49.365 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:16:49.367  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:16:49.367  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:16:49.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:16:49.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:16:49.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:16:49.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:16:49.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:16:49.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:16:49.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:16:49.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:16:49.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:16:49.372 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:16:49.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: b9c89ab369a1714bdc88e75668b32fc82e43d62421b02a301c9538793096d3af448f8e853d767fbdbffa145cddb23a25b8ead3781f39e52f0492584674d13c623e8a5031ad447bcadb73149aff0f1d4bc9c9206d0ec5c750377c5b5171a8a3eae2e573d9c8f4adde06f7325932646e13c18835aa4b128bf4279fbd09daf9d174a6c100b792c91c01dd9e8442a307d3c7962a7c408b14aa50f1d1d31ba9933dcde18029a441d0d3d662fafd7e9e48f56d111838e8a829462e095e816253bda1553b4061f684d68ff16f2ead60b9f5ca59434244c43f324769a804f5b863a1cb65028eb30cbac991feb7861c9eb9bc1f25a93b2f55c0f6d7f12646fae2e2b5544d4fab77bfa29a312688e9d9ba98c48cfc019afb9edb346166f4d49d1e24778b9149233a6e419a8fc569932466a61f32f2c4bb056fe8fd5b4f9ecce183539dc4a243e2d478224c7a46665cb2bc3f7d6bf519fb81193fc45542e75a0ab97b52edf2698ffd6cd9ef75d00441eb8746699bbe52ef967b3119aee93a43ccd1b16493fd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:89:af:2a:46:5f:83:14:12:48:04:96:a7:ca:1c:67:5d:7b:2a:75]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:20:03.646  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:20:03.648 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:20:03.650 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:20:03.650 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:20:03.651  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:20:03.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:20:03.652  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:20:03.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:20:03.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:20:03.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:20:03.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:20:03.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:20:03.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:20:03.657 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:20:03.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:20:03.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:20:03.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:20:03.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:20:03.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:20:03.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:20:03.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:20:03.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:20:03.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:20:03.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:20:03.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:20:03.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:20:03.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:20:03.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:20:03.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:20:03.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:20:03.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:44:7d:97:74:83:11:2d:f8:68:55:70:ca:83:69:94:b7:ec:82:94]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:24:43.314  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:24:43.315 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:24:43.317 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:24:43.317 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:24:43.318  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:24:43.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:24:43.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:24:43.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:24:43.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:24:43.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:24:43.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:24:43.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:24:43.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:24:43.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:24:43.449  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:24:43.449  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:24:43.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:24:43.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:24:43.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:24:43.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:24:43.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:24:43.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:24:43.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:24:43.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:24:43.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:24:43.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:24:43.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:24:43.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:24:43.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:24:43.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:24:43.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:f3:c9:38:84:c5:38:ba:da:bc:b4:ea:4f:e3:79:d2:5c:4d:6a:25]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:30:18.165  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:30:18.166 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:30:18.169 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 17:30:18.170 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:30:18.170  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 17:30:18.170  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:30:18.171  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:30:18.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:30:18.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:30:18.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:30:18.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:30:18.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:30:18.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:30:18.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:30:18.355  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:30:18.356  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:30:18.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:30:18.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:30:18.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:30:18.358  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:30:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:30:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:30:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:30:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:30:18.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:30:18.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:30:18.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:30:18.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:30:18.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:30:18.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:30:18.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:c9:5a:6f:25:70:a9:33:2b:83:cc:65:bf:91:32:e6:a7:f0:7c:51]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:30:46.528  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:30:46.529 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:30:46.530 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:30:46.530 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:30:46.531  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 17:30:46.531  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:30:46.531  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:30:46.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:30:46.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:30:46.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:30:46.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:30:46.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:30:46.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:30:46.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:30:46.645  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:30:46.646  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:30:46.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:30:46.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:30:46.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:30:46.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:30:46.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:30:46.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:30:46.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:30:46.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:30:46.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:30:46.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:30:46.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:30:46.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:30:46.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:30:46.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:30:46.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: b9c89ab369a1714bdc88e75668b32fc82e43d62421b02a301c9538793096d3af448f8e853d767fbdbffa145cddb23a25b8ead3781f39e52f0492584674d13c623e8a5031ad447bcadb73149aff0f1d4bc9c9206d0ec5c750377c5b5171a8a3eae2e573d9c8f4adde06f7325932646e13c18835aa4b128bf4279fbd09daf9d174a6c100b792c91c01dd9e8442a307d3c7962a7c408b14aa50f1d1d31ba9933dcde18029a441d0d3d662fafd7e9e48f56d111838e8a829462e095e816253bda1553b4061f684d68ff16f2ead60b9f5ca59434244c43f324769a804f5b863a1cb65028eb30cbac991feb7861c9eb9bc1f25a93b2f55c0f6d7f12646fae2e2b5544d4fab77bfa29a312688e9d9ba98c48cfc019afb9edb346166f4d49d1e24778b9149233a6e419a8fc569932466a61f32f2c4bb056fe8fd5b4f9ecce183539dc4a243e2d478224c7a46665cb2bc3f7d6bf519fb81193fc45542e75a0ab97b52edf2698ffd6cd9ef75d00441eb8746699bbe52ef967b3119aee93a43ccd1b16493fd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:d1:e0:9f:45:5a:72:29:19:43:98:4d:03:a6:b4:ac:7e:5f:0e:63]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 17:31:31.663  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 17:31:31.665 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 17:31:31.666 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 17:31:31.667 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 17:31:31.667  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 17:31:31.668  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 17:31:31.668  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 17:31:31.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 17:31:31.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 17:31:31.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 17:31:31.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 17:31:31.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:31:31.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 17:31:31.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:31:31.774  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 17:31:31.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 17:31:31.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 17:31:31.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 17:31:31.777  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 17:31:31.777  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 17:31:31.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:31:31.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:31:31.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:31:31.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:31:31.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:31:31.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:31:31.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 17:31:31.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 17:31:31.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 17:31:31.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 17:31:31.784 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 567863648266579518321232937000453338446628336681
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 10:16:04 UTC 2022
           Final Date: Mon May 24 10:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:00:34:c9:00:75:1b:3c:b7:46:63:3f:53:ef:a3:a4:76:f9:7c:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 858e0bb8040bbb99deeb50a317ca00e29cd4b32b
                       f02ad8b6a0ffa120aa0da8d0230d1ed2607e8f40
                       955bce3ae221955606fca12f1d8a850a4065bb1d
                       c7d32fb740bf451ebfb18d32ed07b55d7f4d45a3
                       bca35e8f829394fc2e01d90d38656de71e530097
                       12fc738e8c41206bda98a76273fda6d4468d207f
                       23271873e34cd0269950da6c62547a8d497327aa
                       da2139731e3eed3750fcff8e904d5df60457bc58
                       641df6bc0d07144458602d4e7503a5c4362cecb2
                       8f3a07cdeae1234e67547061024dfded88ecdf59
                       7813d685ebcc7195412b5710412be767c54c4e67
                       5f69647f3c0b49a814ec5f745684c85c4df8ee81
                       9267149fdd612c6598ecc9d3b5edf7150f5f3f0a
                       bcb852369872ee16db4d98082b7d907cf5616f7d
                       58f9e32e2e3016ad7fc58e2195bfa59e8ffb0031
                       10d322dc7a69c8215555d082c525ce01ded38f23
                       e3493dfb2ca6345638ec185260a439d8ed27fabb
                       2667d8a06b66260f254ccb6d35c8698b7e3bad70
                       c97b2b146f7dc8c7fd69f44365f7f7cec478b4de
                       6bfac9cc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:1f:8e:12:79:37:eb:3d:c0:16:fc:1d:2c:4e:28:79:9b:57:f3:be]
            modulus: ce8e81b3847f220df0c629108f6b7c13f84b678547f5c9577deb61b85a8b75327bbbccf0fec7e72e2b253778662f4264ddc6b5572d308309b1e404e0ae40d22a1e3d26cf4631fe74087890f36fac6edc6a4030f7d57832cfafeead1a9bfc37926b90f46ce31051df993698560b55b532f7574c0c966f4c9695ab6a85e531bbae0fa1160d4bdaf45abdec931a14c99c19eb5c23770033e3559272f9f7d80e50718bcbbe1dd497a92b91c2aa7cf85d672e48ff5f25bd44e38a9e951b3c597b3106ec58f10dbcb80f3c9ad54da1dd009160533281948fe4ccf0d5711df218870c59944958748751f8983e0fdb31c605d8608d9ca93c7093c7a8483b4772cce99fdd
    public exponent: 10001

]