Results

By type

          2022-08-14 03:32:17,578 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-14 03:32:18,834 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-14 03:32:19.930  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 14, 2022 3:32:22 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 14, 2022 3:32:22 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 14, 2022 3:32:22 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 14, 2022 3:32:22 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-14 03:32:23.699 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-14 03:32:24.185  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-14 03:32:24.518  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-14 03:32:25.846 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-14 03:32:25.850 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-08-14 03:32:25.853 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-14 03:32:25.858 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-14 03:32:25.905 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-08-14 03:32:25.909 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-08-14 03:32:26.113 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-14 03:32:27.139 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 14, 2022 3:32:28 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-14 03:32:29.077  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.659 seconds (JVM running for 15.192)
Aug 14, 2022 3:32:52 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-14 03:33:29.362  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 03:33:29.375 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 03:33:29.454 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-14 03:33:29.461 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 03:33:29.501  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-14 03:33:29.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 03:33:29.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 03:33:29.530 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 03:33:29.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 03:33:29.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 03:33:29.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 03:33:29.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 03:33:29.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 03:33:29.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 03:33:29.628 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 03:33:29.632 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 03:33:37.388  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 03:33:37.392  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 03:33:37.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 03:33:37.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 03:33:37.423  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 03:33:37.426  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 03:33:37.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 03:33:37.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 03:33:37.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 03:33:37.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 03:33:37.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 03:33:37.451 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 03:33:37.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 03:33:37.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 03:33:37.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 03:33:37.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 03:33:37.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:72:8c:d5:ca:c3:c7:30:78:72:12:a3:a7:67:46:b9:61:c0:2a:8f]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 04:55:03.007  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 04:55:03.013 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 04:55:03.017 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 04:55:03.018 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 04:55:03.020  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 04:55:03.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 04:55:03.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 04:55:03.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 04:55:03.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 04:55:03.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 04:55:03.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 04:55:03.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 04:55:03.055 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 04:55:03.055 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 04:55:03.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 04:55:03.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 04:55:03.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 04:55:03.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 04:55:03.357  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 04:55:03.358  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 04:55:03.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:55:03.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:55:03.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:55:03.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:55:03.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:55:03.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:55:03.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:55:03.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:55:03.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:55:03.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 04:55:03.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:9e:82:44:49:42:14:e6:a3:58:f0:0b:85:55:88:6d:2c:84:44:7e]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 04:58:00.238  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 04:58:00.241 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 04:58:00.244 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 04:58:00.245 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 04:58:00.246  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 04:58:00.247  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 04:58:00.248  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 04:58:00.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 04:58:00.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 04:58:00.251 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 04:58:00.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 04:58:00.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 04:58:00.271 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 04:58:00.365 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 04:58:03.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 04:58:03.230  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 04:58:03.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 04:58:03.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 04:58:03.238  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 04:58:03.239  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 04:58:03.239 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:58:03.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:58:03.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:58:03.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:58:03.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:58:03.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:58:03.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:58:03.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:58:03.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:58:03.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 04:58:03.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: ba4c4eb6848e02ff56d9070eb1d5786d33c5023f93f995d97d9ea4c7077a330f2f8b64c45259fa39b19f2efed87ca35aa7e0c17d5dedd1ae5e9d90ff4ff6e2bf4f79456dac18c3e872704bf13d26112f9f4dcf4b5a63a8e86c5ff850c10e428ef08174f8f245351684272d9e1632019f19697dc9f49deb1a7c162dd630fe8178b7321fa9c6202cbac228d2f3ba122df3f011023bb7ba49158fd7ed3d9020ff1b1616b65bd715b0fad6e25b4e61c46746d2bf8512e0b7898c4a8fc78fe7a78ef4dae4365d4d23b01072dcf52c9560c9a10506a866b7de5e7cffbfdab785525723c536587c91e48dc5ade86eea54c441dce293a7ee7cfc14c58331f243230f9bca778fe308c980f7403c1b084b88d5d6e4d7aaeb6449fd5308c385c4028682219230f8823e3c858f7fcbbb0ca731db00fc6ceabe5f7ac4cd057aff4f3b100b00f3d9a6712e7edc736de03eb17df06ccb6e8c4ce8e7e8b6afebef82d43d43e80af1f67612841e0d61240d2ac602e23f4b60e32d3a27000023a5350cdee36910a7b1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:e5:0f:04:09:22:c7:46:a1:85:9d:71:e3:90:aa:07:e0:16:c7:34]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 04:59:19.705  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 04:59:19.707 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 04:59:19.711 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-14 04:59:19.713 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 04:59:19.714  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-14 04:59:19.715  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 04:59:19.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 04:59:19.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 04:59:19.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 04:59:19.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 04:59:19.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 04:59:19.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 04:59:19.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 04:59:19.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 04:59:19.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 04:59:19.957  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 04:59:19.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 04:59:19.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 04:59:19.963  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 04:59:19.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 04:59:19.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:59:19.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:59:19.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:59:19.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:59:19.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:59:19.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:59:19.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 04:59:19.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 04:59:19.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 04:59:19.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 04:59:19.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:d2:4c:b3:6a:c2:8f:3a:e4:f8:1a:9b:a8:1c:fe:8b:9f:d3:ea:a9]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:00:43.160  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:00:43.165 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:00:43.166 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-14 05:00:43.167 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:00:43.168  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-14 05:00:43.169  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:00:43.169  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:00:43.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:00:43.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:00:43.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:00:43.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:00:43.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:00:43.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:00:43.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:00:43.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:00:43.402  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:00:43.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:00:43.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:00:43.405  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:00:43.406  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:00:43.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:00:43.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:00:43.408 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:00:43.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:00:43.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:00:43.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:00:43.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:00:43.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:00:43.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:00:43.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:00:43.417 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:10:9c:88:2d:81:ea:78:fa:a6:92:af:e9:95:4c:ee:5f:68:21:cd]
            modulus: b141f8cf3660a81db7b4e27851413fd76e786efebb71f358ed71d1ec607a5c39e3f8e912969be4f3c5f84e2a89d93bd71a867d6a86796e3b0869045b0d279134432b1806fadd173eac76852076f7b6d0a010746330f3b72e6ec115cb2dced5e3b532c0912030d05d50aa842fcb3ad3a2e647d01bba3c604168a414a1e045ea63fd4a424eff77444e775b6c7f0487ce1f539d9a6a40f83fa667a96b9cf6d01feb2207f68547c90086dcb003cfcaa2daf27ef80aee8a0660af8d04f3c9dbb0db70863719aeba3721ee295e464abe781615d09c8e37a434b63eb61d284abb6c59177e8e3f0bd8e82cc2e68e9a4f3cbfd0f74f89e8117d6429e8ddad45645547c539
    public exponent: 10001

] 
2022-08-14 05:03:36.625  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:03:36.629 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:03:36.632 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:03:36.633 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:03:36.633  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:03:36.634  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:03:36.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:03:36.635 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:03:36.635 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:03:36.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:03:36.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:03:36.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:03:36.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:03:36.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:03:36.943  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:03:36.944  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:03:36.944 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:03:36.945 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:03:36.947  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:03:36.947  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:03:36.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:03:36.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:03:36.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:03:36.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:03:36.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:03:36.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:03:36.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:03:36.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:03:36.952 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:03:36.956 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:03:36.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:20:b5:4e:b3:1b:55:1d:aa:46:dc:36:61:d9:33:26:8e:88:85:51]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:07:54.955  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:07:54.956 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:07:54.958 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:07:54.958 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:07:54.959  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:07:54.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:07:54.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:07:54.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:07:54.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:07:54.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:07:54.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:07:54.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:07:54.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:07:54.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:07:55.178  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:07:55.179  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:07:55.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:07:55.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:07:55.182  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:07:55.183  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:07:55.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:07:55.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:07:55.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:07:55.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:07:55.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:07:55.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:07:55.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:07:55.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:07:55.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:07:55.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:07:55.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:01:a5:d9:1d:d4:89:ae:bb:6f:29:b9:c9:eb:8a:d2:4b:ea:8e:63]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:12:19.378  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:12:19.380 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:12:19.383 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:12:19.384 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:12:19.385  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:12:19.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:12:19.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:12:19.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:12:19.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:12:19.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:12:19.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:12:19.398 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:12:19.398 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:12:19.399 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:12:19.760  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:12:19.761  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:12:19.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:12:19.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:12:19.764  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:12:19.764  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:12:19.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:12:19.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:12:19.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:12:19.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:12:19.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:12:19.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:12:19.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:12:19.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:12:19.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:12:19.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:12:19.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:bf:7d:3d:1f:9e:d6:3f:1c:89:e6:88:01:e5:78:b1:96:ce:c6:2f]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:14:01.764  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:14:01.767 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:14:01.770 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-14 05:14:01.771 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:14:01.772  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-14 05:14:01.772  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:14:01.773  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:14:01.773 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:14:01.774 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:14:01.774 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:14:01.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:14:01.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:14:01.783 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:14:01.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:14:01.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:14:01.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:14:01.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:14:01.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:14:01.993  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:14:01.993  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:14:01.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:14:01.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:14:01.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:14:01.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:14:01.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:14:01.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:14:02.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:14:02.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:14:02.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:14:02.006 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:14:02.012 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:21:10:62:2a:0e:3c:0c:6a:a3:52:f4:19:4d:91:bf:c5:06:a5:1a]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:16:24.819  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:16:24.825 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:16:24.842 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:16:24.853 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:16:24.853  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:16:24.854  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:16:24.856  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:16:24.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:16:24.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:16:24.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:16:24.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:16:24.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:16:24.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:16:24.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:16:25.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:16:25.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:16:25.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:16:25.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:16:25.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:16:25.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:16:25.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:16:25.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:16:25.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:16:25.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:16:25.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:16:25.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:16:25.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:16:25.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:16:25.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:16:25.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:16:25.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:3b:da:0d:96:0f:7a:3c:e0:52:d9:73:88:0e:6f:59:74:2d:a2:42]
            modulus: f483d4c55cd39767a5514bf7587ab14b1db668b1e93d3cc71c7da5bcfa8272194c3e7c538840f7955c47857c3d23996d22df812c0a5c0f8d02501dc4e57f7ec3111cbc8db226a5e5f1f3ebce24ab1dc612aa1e8525ecdaecce2d00fd107ed8a93578ab5b0f44c0f603b6532cfd665e9b704e6d8b076aad2af19bda002f9ea32fc528103b095675d3026eb7f6e2607223e898562e353808b77c98222ace34c6acc0f6b20d9927c003ab6cab4f8a9c33cb4fcbf4e3e458f8a267197e5c2957d49d3e41a4dfe8ba6c40c62c3285c91b8c9028b450f872b03e76e93db8df16024facaa6337d0e78966cf2b0cba1d803efb63186e021fea37cd3176f39c01f354476b
    public exponent: 10001

] 
2022-08-14 05:22:45.268  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:22:45.272 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:22:45.275 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:22:45.276 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:22:45.277  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:22:45.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:22:45.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:22:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:22:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:22:45.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:22:45.291 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:22:45.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:22:45.295 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:22:45.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:22:45.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:22:45.561  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:22:45.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:22:45.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:22:45.572  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:22:45.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:22:45.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:22:45.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:22:45.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:22:45.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:22:45.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:22:45.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:22:45.577 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:22:45.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:22:45.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:22:45.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:22:45.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:46:9c:e7:b2:62:ae:00:67:c9:9b:bc:69:89:1a:d1:f1:58:28:16]
            modulus: ab5af91311ba834818067a58ef9183cc109a0a4bb68964ea37295ec2c009896c57d2e79b269b3bc3f14a716d69d6f7e527100ede24ffef27e675e7b402f9add5d06193f25a8e36492e12c8e7d64ad5ac372307a204d730b077662182e34999cedcc8e5d79b0075ae470f50358410e814989193867b65aafdf88c329d1bfa88b862e0d9db1d69a706516b2987e84310df1b2fed4ffc00b760307a918f77bcf853c1ca832d85252dc58660f840cde9481ad15494cf7d211655292d8e681810eb61edd8c6dff8a3b0f452d70b9487805c509bf7d15c129412e0477e392f3c3b8880a3f1cb7318e2610a1d63055f50996371f99fd5311a6019dff527870701a24fa5
    public exponent: 10001

] 
2022-08-14 05:22:47.870  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:22:47.871 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:22:47.872 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-14 05:22:47.873 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:22:47.873  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-14 05:22:47.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:22:47.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:22:47.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:22:47.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:22:47.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:22:47.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:22:47.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:22:47.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:22:47.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:22:48.024  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:22:48.025  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:22:48.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:22:48.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:22:48.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:22:48.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:22:48.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:22:48.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:22:48.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:22:48.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:22:48.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:22:48.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:22:48.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:22:48.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:22:48.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:22:48.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:22:48.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:db:9b:a7:7b:43:41:dd:ee:e6:ed:67:76:82:39:26:80:78:f0:49]
            modulus: e1f0e2d5ffcf5aa3e4e2498dc360323d2a9c2a3746d103925d71c9345dc928886f6ead2bb7128a7be82eb1f7a38147a977f4b3b411115716f5ee44446aacdf4b9452d25f3c3bdde80fcc00f414709ba8a03b9841ce182f3bb9b502a352808deecb7a9b4a95be12ef82257bbeb16601eb64046e5cc839220ac9437330b47ee540cfc5a4ebe20740618b5c291d087686b032825cb3a7cff97ea34fa829bc9a9071cf0de75acb4cb2b7c313e76d0d1e65663bcbda364f9b6bfeae3a8e697736555aa625317f9c7e123fb6251da1ef24a159e400c20880da92b39e2148a335b192706df158b972cf31faf7c6619769e2b1b646d2e2d7fbea17b9e214e96fefa49683
    public exponent: 10001

] 
2022-08-14 05:23:05.383  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:23:05.385 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:23:05.386 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-14 05:23:05.387 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:23:05.387  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-14 05:23:05.388  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:23:05.388  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:23:05.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:23:05.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:23:05.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:23:05.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:23:05.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:23:05.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:23:05.402 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:23:05.600  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:23:05.602  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:23:05.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:23:05.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:23:05.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:23:05.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:23:05.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:23:05.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:23:05.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:23:05.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:23:05.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:23:05.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:23:05.608 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:23:05.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:23:05.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:23:05.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:23:05.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:a6:c3:76:df:4c:d2:ec:40:95:13:16:e6:c3:84:2d:6d:cc:fe:d8]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:27:23.255  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:27:23.258 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:27:23.260 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:27:23.262 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:27:23.262  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:27:23.263  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:27:23.264  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:27:23.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:27:23.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:27:23.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:27:23.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:27:23.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:27:23.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:27:23.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:27:23.615  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:27:23.616  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:27:23.616 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:27:23.617 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:27:23.619  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:27:23.619  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:27:23.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:27:23.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:27:23.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:27:23.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:27:23.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:27:23.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:27:23.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:27:23.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:27:23.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:27:23.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:27:23.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:f0:14:b9:d3:1d:89:56:68:78:03:ec:ce:b2:2a:88:5c:94:2d:39]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:33:03.650  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:33:03.656 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:33:03.673 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:33:03.675 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:33:03.676  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:33:03.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:33:03.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:33:03.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:33:03.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:33:03.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:33:03.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:33:03.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:33:03.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:33:03.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:33:03.988  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:33:03.989  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:33:03.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:33:03.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:33:03.991  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:33:03.992  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:33:03.992 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:33:03.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:33:03.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:33:03.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:33:03.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:33:03.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:33:03.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:33:03.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:33:03.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:33:03.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:33:04.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:93:55:d6:5e:6f:20:de:16:6d:dc:59:7d:f0:7d:0e:c9:37:36:84]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:39:39.146  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:39:39.149 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:39:39.153 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:39:39.154 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:39:39.154  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:39:39.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:39:39.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:39:39.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:39:39.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:39:39.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:39:39.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:39:39.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:39:39.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:39:39.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:39:39.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:39:39.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:39:39.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:39:39.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:39:39.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:39:39.387  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:39:39.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:39:39.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:39:39.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:39:39.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:39:39.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:39:39.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:39:39.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:39:39.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:39:39.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:39:39.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:39:39.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:e0:41:6a:42:92:1b:57:2e:35:eb:2a:bc:80:00:92:ac:42:f2:ba]
            modulus: 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
    public exponent: 10001

] 
2022-08-14 05:44:13.928  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-14 05:44:13.930 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-14 05:44:13.932 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:44:13.933 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-14 05:44:13.934  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-14 05:44:13.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-14 05:44:13.935  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-14 05:44:13.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-14 05:44:13.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-14 05:44:13.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-14 05:44:13.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-14 05:44:13.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:44:13.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-14 05:44:13.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:44:14.175  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-14 05:44:14.176  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-14 05:44:14.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-14 05:44:14.177 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-14 05:44:14.179  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-14 05:44:14.179  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-14 05:44:14.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:44:14.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:44:14.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:44:14.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:44:14.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:44:14.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:44:14.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-14 05:44:14.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-14 05:44:14.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-14 05:44:14.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-14 05:44:14.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 700621248096741695559684734464849054679493766843
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 14 03:29:27 UTC 2022
           Final Date: Fri Aug 13 03:29:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c0:7c:22:60:80:33:81:5e:fc:e4:3a:4a:cf:25:d2:7e:5d:1f:5c:66]
            modulus: ba4c4eb6848e02ff56d9070eb1d5786d33c5023f93f995d97d9ea4c7077a330f2f8b64c45259fa39b19f2efed87ca35aa7e0c17d5dedd1ae5e9d90ff4ff6e2bf4f79456dac18c3e872704bf13d26112f9f4dcf4b5a63a8e86c5ff850c10e428ef08174f8f245351684272d9e1632019f19697dc9f49deb1a7c162dd630fe8178b7321fa9c6202cbac228d2f3ba122df3f011023bb7ba49158fd7ed3d9020ff1b1616b65bd715b0fad6e25b4e61c46746d2bf8512e0b7898c4a8fc78fe7a78ef4dae4365d4d23b01072dcf52c9560c9a10506a866b7de5e7cffbfdab785525723c536587c91e48dc5ade86eea54c441dce293a7ee7cfc14c58331f243230f9bca778fe308c980f7403c1b084b88d5d6e4d7aaeb6449fd5308c385c4028682219230f8823e3c858f7fcbbb0ca731db00fc6ceabe5f7ac4cd057aff4f3b100b00f3d9a6712e7edc736de03eb17df06ccb6e8c4ce8e7e8b6afebef82d43d43e80af1f67612841e0d61240d2ac602e23f4b60e32d3a27000023a5350cdee36910a7b1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 941680d975c1537db0785152f1a3d397fb060c8a
                       d9d046986c3dabb701928e2810e7737872ac0ff5
                       957992e3b7a3e01c03e51c741234acff67a95832
                       7816a33ce09f26dd2e8c41859275e78f074a39c9
                       878d89b4198e19f7de22a918213bf481ea2f0a9f
                       ec768c96c18e16d50d00583159a8f5708b1ea4be
                       eb6bb1739197ef0de0fce6a03513ebd339377a72
                       715bf8fd69d0e56437fd9be4539a57d2ef6590c9
                       9610d0af3b4c76d171b1a729c1267d1c16c95585
                       ad598c10b9b8bf54d1b1c886ce8d59e78ca772c3
                       493d6da3e4fce5e10591f7ac5b98a0b8bc27a602
                       054bf0d1038ca80f98a81f8db0293970cecb2064
                       7a0455e3df897aa643b9ba3c266ebb418a3a15db
                       2a43047bfca960e1ef034f792eec32543984921a
                       38195e533d2d2f13fb4a1cb05d5ed853a95cabfc
                       7f85059f0b017e65853dfbc97281e105a44314ad
                       92e7482127b554a45245dbe9cd25d9ab31a858ce
                       b248a36814d4cc7d49be7836ca96ef78da998294
                       0304c53e3d4a869ce4f9ec0ead45a1dc442cc1e3
                       a1149c3b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:0f:88:23:0c:be:43:81:22:59:e4:8d:97:d2:cc:60:a7:58:1d:60]
            modulus: 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
    public exponent: 10001

]