Results

By type

          2022-06-07 15:11:41,600 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-07 15:11:42,739 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-07 15:11:43.500  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 07, 2022 3:11:45 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 07, 2022 3:11:45 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 07, 2022 3:11:45 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 07, 2022 3:11:45 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-07 15:11:46.260 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-07 15:11:46.561  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-07 15:11:46.738  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-07 15:11:47.508 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-07 15:11:47.511 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-07 15:11:47.512 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-07 15:11:47.516 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-07 15:11:47.557 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-07 15:11:47.560 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-07 15:11:47.691 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-07 15:11:48.377 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 07, 2022 3:11:49 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-07 15:11:49.413  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.712 seconds (JVM running for 10.657)
Jun 07, 2022 3:12:15 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-07 15:12:55.241  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 15:12:55.253 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 15:12:55.301 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 15:12:55.306 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 15:12:55.324  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 15:12:55.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 15:12:55.329  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 15:12:55.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 15:12:55.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 15:12:55.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 15:12:55.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 15:12:55.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 15:12:55.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 15:12:55.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 15:12:55.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 15:12:55.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 15:13:05.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 15:13:05.955  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 15:13:05.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 15:13:05.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 15:13:05.967  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 15:13:05.973  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 15:13:05.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 15:13:05.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 15:13:05.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 15:13:05.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 15:13:05.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 15:13:05.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 15:13:06.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 15:13:06.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 15:13:06.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 15:13:06.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 15:13:06.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:9e:74:88:b8:e6:a4:58:08:65:2c:6d:6c:fd:1a:67:f0:4e:61:88]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 16:43:36.218  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 16:43:36.221 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 16:43:36.231 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:43:36.232 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 16:43:36.239  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:43:36.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 16:43:36.242  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 16:43:36.243 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 16:43:36.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 16:43:36.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 16:43:36.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 16:43:36.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:43:36.256 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:43:36.256 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:43:36.579  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 16:43:36.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 16:43:36.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 16:43:36.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:43:36.585  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 16:43:36.586  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 16:43:36.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:43:36.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:43:36.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:43:36.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:43:36.590 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:43:36.590 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:43:36.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:43:36.592 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:43:36.592 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:43:36.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 16:43:36.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:c4:9b:f1:2c:ba:4e:3d:55:95:5e:38:7f:b9:1e:9a:85:e5:f3:b1]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 16:45:23.912  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 16:45:23.913 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 16:45:23.915 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 16:45:23.916 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 16:45:23.916  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 16:45:23.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 16:45:23.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 16:45:23.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 16:45:23.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 16:45:23.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 16:45:23.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 16:45:23.928 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:45:23.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:45:23.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:45:24.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 16:45:24.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 16:45:24.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 16:45:24.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:45:24.113  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 16:45:24.113  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 16:45:24.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:45:24.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:45:24.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:45:24.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:45:24.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:45:24.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:45:24.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:45:24.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:45:24.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:45:24.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 16:45:24.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:cc:eb:49:18:fd:8c:63:0e:1c:fa:86:09:f3:83:4b:c3:1d:50:81]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 16:46:54.050  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 16:46:54.052 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 16:46:54.054 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 16:46:54.054 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 16:46:54.055  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 16:46:54.056  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 16:46:54.056  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 16:46:54.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 16:46:54.057 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 16:46:54.057 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 16:46:54.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 16:46:54.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:46:54.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:46:54.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:46:54.255  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 16:46:54.256  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 16:46:54.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 16:46:54.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:46:54.259  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 16:46:54.259  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 16:46:54.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:46:54.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:46:54.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:46:54.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:46:54.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:46:54.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:46:54.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:46:54.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:46:54.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:46:54.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 16:46:54.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:85:ea:2c:5f:1b:d4:19:98:69:45:53:c9:98:56:86:6c:76:98:c8]
            modulus: a59480c5e4ef2f4c910d599b6ad5419bfce081246c522b003a9f94cc6cf685799b773a410c4adf6f50e201b0c69f7cea1ffaef5c235064f8cc3fa45c20a5e8f2c40f66dd3e5fe91fd33e12baf29008c56656b5b69fb5cff9fa7734e834c2c65471e3d980efbcaa7884c36351b929d915a86f9dfead7e9d7e839b98faff5aecde4a90428e0605c0d69f5a55edec6f8d118930a283d8e7a8b8638da89e774ae5d48fe4c072a4442a624a8c01c73b5778ab9f7154176c31ae9ad6920158ed1d0845b0e5e2e7f0be9192cca90e2531fa31eb69532f5e62ff5d312bf53dc58e16f1d4d888c442d39c652fd472b2cc7718efb78c5103e4f0bb18f0a1521d9d02c43a47
    public exponent: 10001

] 
2022-06-07 16:48:55.007  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 16:48:55.009 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 16:48:55.010 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:48:55.011 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 16:48:55.012  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:48:55.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 16:48:55.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 16:48:55.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 16:48:55.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 16:48:55.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 16:48:55.019 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 16:48:55.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:48:55.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:48:55.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:48:55.216  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 16:48:55.217  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 16:48:55.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 16:48:55.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:48:55.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 16:48:55.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 16:48:55.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:48:55.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:48:55.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:48:55.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:48:55.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:48:55.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:48:55.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:48:55.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:48:55.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:48:55.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 16:48:55.228 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:ac:27:23:af:ca:42:fe:73:8d:25:4f:11:ac:2c:bd:78:5b:9d:32]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 16:52:25.058  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 16:52:25.060 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 16:52:25.063 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:52:25.064 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 16:52:25.064  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:52:25.065  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 16:52:25.066  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 16:52:25.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 16:52:25.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 16:52:25.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 16:52:25.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 16:52:25.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:52:25.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:52:25.077 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:52:25.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 16:52:25.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 16:52:25.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 16:52:25.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:52:25.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 16:52:25.253  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 16:52:25.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:52:25.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:52:25.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:52:25.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:52:25.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:52:25.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:52:25.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:52:25.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:52:25.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:52:25.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 16:52:25.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:d1:fe:11:bf:28:78:fe:57:c5:73:ff:9f:52:df:ab:85:4d:06:fd]
            modulus: e1ab092446c90e672298e47d90491593f0c65f87b4ecbd1b23e7d5a247e39885b64cc946f2c3aeb380b5af39f88c7e91bac0cedc0cd942b0a1edf01d4aefc929e87fec2f60e6ae4452ea7aa953070dcc42893432ea8d54bf0e39ded40abb80d404dbfbfae1ef2444d07fb798b175a5c9ed99de0ef6d66c1fe1c8adb5ea8a8f08a99ce17bca86d0348231adc6723ee0013b26fab5a5bf3537bc70816cc9fa0008f1ac7b7d4c86e8bae34d64574ab393b46910760395dd0990df250fb6d559acfba24f1c97a32b12710d9f8dbb74cb057915cf17a49bc24041351bb9faed1bb23931a7cf7030e2d6126b3a4ef12b355875a6a2abff17d10ba4f632f5cdc3e0a403
    public exponent: 10001

] 
2022-06-07 16:57:19.839  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 16:57:19.842 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 16:57:19.844 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:57:19.845 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 16:57:19.846  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 16:57:19.846  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 16:57:19.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 16:57:19.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 16:57:19.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 16:57:19.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 16:57:19.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 16:57:19.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:57:19.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 16:57:19.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:57:20.003  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 16:57:20.004  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 16:57:20.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 16:57:20.005 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 16:57:20.007  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 16:57:20.007  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 16:57:20.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:57:20.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:57:20.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:57:20.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:57:20.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:57:20.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:57:20.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 16:57:20.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 16:57:20.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 16:57:20.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 16:57:20.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: b401d071b6e94672d8d268ec1510871d03e59c770ac45b55fa538c73b33bfba5272ff5fec397107aca5bed4c5e7e4b3b55393ae2555b1a277cbf12de810efb081fce58c27eea878951d16603d015c4e66a08e80e39b0b54603a5d8b21db37cf47e099abeb09cdeaa877630bee9ab20575c3cf82d3e5aa3a6a944d7423e938e04bbb553186e4d95f7dc80cf02f3ce7801676f854076ded69179e72f0ee4326ba97bf2be03057d4b666745937f07cc1294f8a3ac5ff77aef294522026736f65a81960b03877c7894b804a978b42c479319d51401e84c10d3eacd032ae20d3ec621721b203c6bed364a54ae05cf0ed92c4c25249382f9c6fcd3ffdef6e28b3282b37d478289036761e908e5a1bc6db6155d827d42c641f7da5569984b0e6927b1a77d421c9ef02a72871cb65d3649e70ecd5403d96ee70865a1727615102ef10188d8c4da6ff1d215355404377961efbd847f6bd81569ae424804e826ffde5e6053486323f4bd39e607178f98d78ff3a216f517228f53c92fffb00a9cf0f4d259b9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:06:cd:99:a1:36:2c:ff:4a:3d:af:7b:6d:fd:0e:13:65:c4:4a:1b]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:00:37.101  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:00:37.104 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:00:37.106 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 17:00:37.107 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:00:37.108  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 17:00:37.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:00:37.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:00:37.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:00:37.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:00:37.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:00:37.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:00:37.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:00:37.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:00:37.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:00:37.370  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:00:37.371  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:00:37.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:00:37.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:00:37.373  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:00:37.373  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:00:37.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:00:37.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:00:37.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:00:37.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:00:37.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:00:37.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:00:37.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:00:37.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:00:37.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:00:37.378 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:00:37.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:fd:58:f1:cc:16:b1:e2:0b:9e:dc:50:7a:9a:03:f7:d1:65:21:ef]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:01:28.331  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:01:28.332 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:01:28.333 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:01:28.334 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:01:28.334  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:01:28.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:01:28.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:01:28.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:01:28.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:01:28.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:01:28.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:01:28.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:01:28.342 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:01:28.342 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:01:28.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:01:28.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:01:28.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:01:28.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:01:28.554  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:01:28.554  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:01:28.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:01:28.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:01:28.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:01:28.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:01:28.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:01:28.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:01:28.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:01:28.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:01:28.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:01:28.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:01:28.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:a8:33:00:be:f9:b2:51:24:49:bc:f1:08:46:a7:92:21:44:54:86]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:05:11.293  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:05:11.294 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:05:11.299 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:05:11.300 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:05:11.300  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:05:11.301  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:05:11.302  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:05:11.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:05:11.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:05:11.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:05:11.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:05:11.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:05:11.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:05:11.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:05:11.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:05:11.480  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:05:11.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:05:11.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:05:11.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:05:11.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:05:11.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:05:11.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:05:11.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:05:11.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:05:11.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:05:11.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:05:11.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:05:11.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:05:11.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:05:11.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:05:11.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:93:b0:2d:f4:77:4d:c3:94:fe:99:98:88:a5:3f:40:b0:0c:24:70]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:07:05.888  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:07:05.890 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:07:05.892 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 17:07:05.893 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:07:05.893  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 17:07:05.894  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:07:05.894  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:07:05.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:07:05.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:07:05.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:07:05.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:07:05.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:07:05.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:07:05.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:07:06.138  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:07:06.138  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:07:06.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:07:06.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:07:06.140  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:07:06.140  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:07:06.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:07:06.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:07:06.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:07:06.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:07:06.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:07:06.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:07:06.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:07:06.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:07:06.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:07:06.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:07:06.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:43:2e:9d:79:c1:d2:f3:7f:b8:30:c4:3a:7a:76:cd:47:81:c7:a9]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:07:21.661  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:07:21.662 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:07:21.664 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 17:07:21.665 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:07:21.665  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 17:07:21.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:07:21.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:07:21.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:07:21.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:07:21.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:07:21.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:07:21.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:07:21.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:07:21.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:07:21.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:07:21.859  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:07:21.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:07:21.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:07:21.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:07:21.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:07:21.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:07:21.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:07:21.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:07:21.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:07:21.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:07:21.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:07:21.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:07:21.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:07:21.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:07:21.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:07:21.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:ad:a9:7c:04:2b:d6:c1:63:fa:ad:1a:51:7b:e0:00:58:9f:dd:64]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:10:06.340  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:10:06.342 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:10:06.343 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:10:06.344 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:10:06.344  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:10:06.345  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:10:06.345  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:10:06.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:10:06.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:10:06.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:10:06.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:10:06.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:10:06.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:10:06.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:10:06.589  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:10:06.589  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:10:06.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:10:06.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:10:06.592  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:10:06.592  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:10:06.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:10:06.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:10:06.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:10:06.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:10:06.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:10:06.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:10:06.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:10:06.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:10:06.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:10:06.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:10:06.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:d4:eb:89:20:75:ce:6d:15:10:02:70:5e:15:85:28:52:fa:9f:aa]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:14:17.134  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:14:17.137 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:14:17.139 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:14:17.140 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:14:17.140  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:14:17.141  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:14:17.142  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:14:17.142 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:14:17.142 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:14:17.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:14:17.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:14:17.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:14:17.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:14:17.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:14:17.307  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:14:17.308  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:14:17.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:14:17.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:14:17.310  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:14:17.310  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:14:17.310 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:14:17.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:14:17.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:14:17.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:14:17.312 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:14:17.312 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:14:17.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:14:17.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:14:17.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:14:17.314 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:14:17.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:21:d2:60:1e:01:55:e1:f0:42:8a:84:70:3a:81:51:e2:cc:8c:b0]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:18:23.845  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:18:23.847 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:18:23.848 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:18:23.849 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:18:23.850  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:18:23.850  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:18:23.851  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:18:23.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:18:23.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:18:23.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:18:23.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:18:23.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:18:23.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:18:23.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:18:24.082  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:18:24.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:18:24.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:18:24.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:18:24.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:18:24.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:18:24.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:18:24.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:18:24.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:18:24.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:18:24.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:18:24.087 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:18:24.087 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:18:24.087 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:18:24.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:18:24.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:18:24.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:15:df:23:24:fc:7a:a7:78:cf:4e:d0:fe:ea:af:9c:71:51:19:5f]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:23:06.095  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:23:06.098 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:23:06.101 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:23:06.102 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:23:06.102  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:23:06.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:23:06.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:23:06.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:23:06.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:23:06.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:23:06.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:23:06.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:23:06.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:23:06.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:23:06.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:23:06.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:23:06.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:23:06.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:23:06.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:23:06.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:23:06.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:23:06.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:23:06.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:23:06.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:23:06.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:23:06.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:23:06.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:23:06.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:23:06.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:23:06.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:23:06.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:13:7e:2d:4a:a1:f6:e7:d6:06:36:fb:55:d3:31:01:de:dd:26:22]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 17:27:02.944  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 17:27:02.946 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 17:27:02.948 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:27:02.949 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 17:27:02.949  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 17:27:02.949  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 17:27:02.950  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 17:27:02.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 17:27:02.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 17:27:02.952 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 17:27:02.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 17:27:02.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:27:02.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 17:27:02.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:27:03.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 17:27:03.095  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 17:27:03.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 17:27:03.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 17:27:03.097  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 17:27:03.097  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 17:27:03.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:27:03.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:27:03.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:27:03.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:27:03.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:27:03.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:27:03.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 17:27:03.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 17:27:03.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 17:27:03.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 17:27:03.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702066981510815576118249393141938859391904695434
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 15:09:14 UTC 2022
           Final Date: Sun Jun 06 15:09:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36]
            modulus: b401d071b6e94672d8d268ec1510871d03e59c770ac45b55fa538c73b33bfba5272ff5fec397107aca5bed4c5e7e4b3b55393ae2555b1a277cbf12de810efb081fce58c27eea878951d16603d015c4e66a08e80e39b0b54603a5d8b21db37cf47e099abeb09cdeaa877630bee9ab20575c3cf82d3e5aa3a6a944d7423e938e04bbb553186e4d95f7dc80cf02f3ce7801676f854076ded69179e72f0ee4326ba97bf2be03057d4b666745937f07cc1294f8a3ac5ff77aef294522026736f65a81960b03877c7894b804a978b42c479319d51401e84c10d3eacd032ae20d3ec621721b203c6bed364a54ae05cf0ed92c4c25249382f9c6fcd3ffdef6e28b3282b37d478289036761e908e5a1bc6db6155d827d42c641f7da5569984b0e6927b1a77d421c9ef02a72871cb65d3649e70ecd5403d96ee70865a1727615102ef10188d8c4da6ff1d215355404377961efbd847f6bd81569ae424804e826ffde5e6053486323f4bd39e607178f98d78ff3a216f517228f53c92fffb00a9cf0f4d259b9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750
                       0b6b647014ca19e122caf99f92f7c908456525af
                       ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec
                       8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115
                       2e693a7245966dc3808a4c30a9e09442ad2128aa
                       36502cbf6f43810af9b00fd9dc1049fc66a48a9a
                       54ba781f9cef1aa2e3aed8399d79848298cb2aa2
                       60e83c32ee38cffefb1b47a672ed6c775ed9a906
                       35f1c85b2fdce1f068a47af5eefaa351c3c03669
                       9269f8f1b6ed8703fd2b0ececa1e44a6776662ae
                       efada2d896482b11cfa3d5d8d066fa85788a5804
                       2861e9fa0f0174a72aea10783dd3d8762a0b0cfd
                       c7229a385340159f3f18131e4cbacdd5c5626aeb
                       883f0f6ea6523d7690ef9ad48442feaf74d7764f
                       74807985244da28f35753b97462a074f4068094d
                       cb6069ab5fec8267258f89ff2006a6766182cfc6
                       3cef637b628cfaee862b0f0f13960c59766d10d1
                       712836c0e956994cbab3f9cdc81e8cb844483a24
                       b6c4f6c42c039b82c9e5fb6782df157af62ffd40
                       8b7d561b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:82:c1:ff:99:fb:27:6d:e4:87:d6:41:1f:23:d4:05:91:c6:94:80]
            modulus: afb335306947b212165a760a389962341c1b19b1df94a75f09ccac659401c6d380b6a41cda224c159b6f1266320b9834f030b5c9b3f90f36f90aece5a9561c1d8baf9c4dd0613bbd86a6be7ee1a10e51798053a2ffe6716e3410714de0d2b930df6085fa35ba075bfcf56e9b5774cde223b7dcd84b235fbcb2456742ce54dab0dbcf6e335853b532c1283848758d12f8203f3aa855244604764783435ea55c3783239db1f1183a20d91b56890b6feb4ba9a3968480a5a7100f50e929cdaeba3f91bb94152994ff75687e2526f29127b29a5bfd5616d3095d60454992a3d7f856b787c6ebf39feb2ecc9806dfd4c3dcbcc621e1ee8e1e36452ce70c4e54cbded3
    public exponent: 10001

]