Results

By type

          2022-06-08 03:32:37,721 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-08 03:32:39,028 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-08 03:32:39.837  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 08, 2022 3:32:42 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 08, 2022 3:32:42 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 08, 2022 3:32:42 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 08, 2022 3:32:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-08 03:32:42.780 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-08 03:32:43.084  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-08 03:32:43.294  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-08 03:32:44.289 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-08 03:32:44.294 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-08 03:32:44.297 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-08 03:32:44.304 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-08 03:32:44.369 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-08 03:32:44.376 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-08 03:32:44.544 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-08 03:32:45.176 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 08, 2022 3:32:46 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-08 03:32:46.449  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.705 seconds (JVM running for 11.709)
Jun 08, 2022 3:33:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-08 03:33:32.642  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 03:33:32.652 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 03:33:32.693 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-08 03:33:32.698 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 03:33:32.717  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-08 03:33:32.719  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 03:33:32.721  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 03:33:32.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 03:33:32.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 03:33:32.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 03:33:32.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 03:33:32.740 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 03:33:32.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 03:33:32.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 03:33:32.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 03:33:32.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 03:33:33.998  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 03:33:34.001  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 03:33:34.002 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 03:33:34.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 03:33:34.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 03:33:34.016  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 03:33:34.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 03:33:34.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 03:33:34.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 03:33:34.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 03:33:34.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 03:33:34.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 03:33:34.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 03:33:34.045 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 03:33:34.045 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 03:33:34.049 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 03:33:34.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:0d:83:47:1f:16:1e:09:73:3c:f5:e7:07:53:f7:66:df:ed:8b:c2]
            modulus: a46f6b8fe53faa49b94afb4694a39644a49951f519223a66a2458650b892d5af515de6e22ffe1d920591c79fbc91eb6b91e3846a3843f0f9933431b23db1c7ff3fd5220faf29ccae9f4d0dfbc641711f2de5761558f3857ea4d36d500aaf177cdc987be40bb6c526c4386da5349eb959cfe8ac4685ecaa60caf493dc837cfc32cb0d80709263d61cceffb62c51293e4a5cdfebe43967dca7980d36e7864363f7df83e0043db0e03435539562dd732c4934a7e239ca00ac1d443ad24dbcc38f7a8e1c4cf74728ee6818ba0be06bf953df6a4ed4f584d3787f562fd310b68cb9bed7131f2946cec65a2c0d78c867b0e687c05b42d21e67e7223cb5e09aa5a5424b
    public exponent: 10001

] 
2022-06-08 04:53:52.449  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 04:53:52.452 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 04:53:52.456 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 04:53:52.458 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 04:53:52.459  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 04:53:52.460  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 04:53:52.461  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 04:53:52.462 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 04:53:52.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 04:53:52.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 04:53:52.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 04:53:52.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 04:53:52.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 04:53:52.481 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 04:53:52.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 04:53:52.834  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 04:53:52.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 04:53:52.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 04:53:52.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 04:53:52.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 04:53:52.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:53:52.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:53:52.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:53:52.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:53:52.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:53:52.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:53:52.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:53:52.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:53:52.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:53:52.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 04:53:52.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:c5:ef:7f:07:6c:bc:1d:65:db:ee:90:46:76:08:f8:5d:bb:36:00]
            modulus: b3a8c160d5e5ee66a659d94fc733d16633977737d7e29e3e20a7c7e591c3fb4792090463a7517c03adbd334d3c07143642b92beb23ecab85e0c15ab3a76e6ac6aab82f21d4c74338d2033daed5472f000d1d4edf6ea874e9cc56122225cbe210503fab6fde559904d8265da87252bdd7937b4e6933ad01b1cdb12d984140327398c8f2e50c823e348e70f8d4e416393a3ed1ce17f33ec21d3c0f68d664b40e1409bdffda030b3ae850c23ca2945688c1a4c6b06a1bc42525fb39c5daeef88bf095f974f8518293e8369557bcdd4f69f1269a89ee289e476892710c6b4671b6e7913b39d15f106dc8047e30ec6bcc039f08259c89ffef148689a1335d11696f65
    public exponent: 10001

] 
2022-06-08 04:55:40.944  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 04:55:40.945 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 04:55:40.947 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-08 04:55:40.948 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 04:55:40.949  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-08 04:55:40.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 04:55:40.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 04:55:40.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 04:55:40.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 04:55:40.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 04:55:40.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 04:55:40.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 04:55:40.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 04:55:40.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 04:55:41.192  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 04:55:41.193  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 04:55:41.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 04:55:41.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 04:55:41.199  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 04:55:41.199  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 04:55:41.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:55:41.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:55:41.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:55:41.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:55:41.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:55:41.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:55:41.207 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:55:41.207 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:55:41.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:55:41.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 04:55:41.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:da:72:8b:25:7d:9c:0e:e5:24:f6:41:fc:02:3e:db:57:db:0f:9b]
            modulus: d4cc3137e4e611d0ad16a52b0b34eced0aaf83d5074f07dcab85a6442f1ef1d84fbba011c86af1330a05a793200c1c0d38fb3d027a82856cf3e42feab48350319a9077c23fbeffe8935da9276c6d73be15e0a7deee478fe481fdf05d8de6fa75cc3534d1dd948004de47d4b72567189c276511821768829e1b39fb1efa6213065c9cdf801497a806d93a6e03929b50d698ee5055914e4807c09a0dfaa21bcc1f26d55bd0e95e53b9b5e2a817a576e39a4953d81f9cd4d4510457ce3ad2aa4f2e32a21c5100e1faf36bcf3e6eb29a460c83680f0ad2aecbcde3dcea8ece6dd89dc7b6faaa96d60458d4684f4ef4b6c2943d4f337734a6f006f827901167636827
    public exponent: 10001

] 
2022-06-08 04:57:28.489  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 04:57:28.490 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 04:57:28.493 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-08 04:57:28.494 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 04:57:28.494  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-08 04:57:28.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 04:57:28.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 04:57:28.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 04:57:28.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 04:57:28.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 04:57:28.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 04:57:28.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 04:57:28.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 04:57:28.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 04:57:28.779  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 04:57:28.780  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 04:57:28.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 04:57:28.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 04:57:28.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 04:57:28.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 04:57:28.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:57:28.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:57:28.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:57:28.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:57:28.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:57:28.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:57:28.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 04:57:28.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 04:57:28.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 04:57:28.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 04:57:28.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:ff:f3:d4:60:dc:ac:46:3f:5a:b1:2d:54:cf:43:bd:3e:18:45:34]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:00:06.721  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:00:06.728 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:00:06.731 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:00:06.732 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:00:06.732  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:00:06.738  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:00:06.740  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:00:06.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:00:06.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:00:06.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:00:06.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:00:06.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:00:06.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:00:06.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:00:06.963  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:00:06.964  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:00:06.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:00:06.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:00:06.966  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:00:06.967  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:00:06.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:00:06.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:00:06.968 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:00:06.968 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:00:06.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:00:06.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:00:06.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:00:06.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:00:06.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:00:06.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:00:06.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:b5:13:51:05:da:2b:07:59:4b:df:df:a0:ab:93:b5:03:e2:6c:0e]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:03:37.203  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:03:37.205 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:03:37.207 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:03:37.208 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:03:37.209  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:03:37.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:03:37.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:03:37.210 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:03:37.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:03:37.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:03:37.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:03:37.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:03:37.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:03:37.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:03:37.510  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:03:37.511  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:03:37.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:03:37.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:03:37.514  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:03:37.514  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:03:37.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:03:37.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:03:37.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:03:37.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:03:37.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:03:37.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:03:37.518 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:03:37.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:03:37.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:03:37.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:03:37.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:d5:9d:ba:1a:a4:b7:1a:05:db:62:fb:e5:39:c9:21:2f:e4:f9:fb]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:08:02.354  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:08:02.356 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:08:02.357 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:08:02.358 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:08:02.359  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:08:02.359  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:08:02.360  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:08:02.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:08:02.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:08:02.361 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:08:02.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:08:02.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:08:02.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:08:02.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:08:02.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:08:02.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:08:02.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:08:02.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:08:02.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:08:02.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:08:02.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:08:02.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:08:02.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:08:02.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:08:02.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:08:02.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:08:02.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:08:02.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:08:02.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:08:02.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:08:02.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:f1:fe:d2:ce:65:03:de:6e:0c:47:04:ca:1b:17:11:17:57:5f:4f]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:11:07.995  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:11:07.997 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:11:08.000 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-08 05:11:08.000 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:11:08.001  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-08 05:11:08.001  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:11:08.001  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:11:08.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:11:08.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:11:08.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:11:08.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:11:08.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:11:08.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:11:08.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:11:08.239  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:11:08.240  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:11:08.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:11:08.241 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:11:08.242  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:11:08.242  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:11:08.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:11:08.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:11:08.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:11:08.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:11:08.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:11:08.245 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:11:08.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:11:08.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:11:08.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:11:08.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:11:08.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:7c:bf:16:ca:d4:1f:27:0f:0f:c9:b6:70:06:81:07:84:94:a8:1c]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:11:45.696  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:11:45.698 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:11:45.700 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:11:45.701 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:11:45.701  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:11:45.702  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:11:45.702  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:11:45.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:11:45.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:11:45.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:11:45.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:11:45.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:11:45.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:11:45.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:11:45.958  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:11:45.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:11:45.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:11:45.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:11:45.961  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:11:45.961  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:11:45.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:11:45.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:11:45.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:11:45.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:11:45.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:11:45.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:11:45.965 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:11:45.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:11:45.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:11:45.967 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:11:45.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: a99bdbb85bbc5da9afdb1434a1b9ac27a86a7d223215d7e26b31885d0611ed4c8e9b8b695b70dacff98ac96e25f139ffb0ffc3c044affeba81657d582042042f4c688a33a07f3bf617ca01e56e152e7edb2201a456606d69e2bb123b7f4b8c681a69921b49da5c9a1ed9f768a1df553404eae1e7891cf82ae4e72d3e7f57de5799a77a1079217babd02c93ffb4be419a9515cf2788d0c502da0024e5dc9da7abe4ba9550c2069e8c988f247d2068f8eefccbbe087d073641b82ac8e91ec85417d5d9999f43147b589bff2f3a22e9a52c5184436183bcceccde8ae3fd7894688dedb5bcec4bd50b5e8d3441131df8620311c42c7cf59af275fd65548976a50a6838451d3f26c6f66707f47ebce30af554934f7eed4c62b2e2f3727d71cd4b0e3c1a70acb00e31ffa2c31ede59839a33ca4e9016381e927c9ff90d143521cefd199684ecf63c5ecdd9626f0e5a6527a9eae89d55c138535aa5e4a48210c40a32ed82b0c617a07dfc83376e886663309aec774ab14376ba3e4682c28e7728668ec9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:e0:7e:ec:69:7f:3c:fa:55:c2:97:6f:81:12:1f:40:fe:98:e0:29]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:16:13.188  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:16:13.191 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:16:13.195 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:16:13.196 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:16:13.197  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:16:13.197  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:16:13.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:16:13.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:16:13.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:16:13.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:16:13.207 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:16:13.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:16:13.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:16:13.209 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:16:13.724  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:16:13.725  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:16:13.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:16:13.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:16:13.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:16:13.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:16:13.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:16:13.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:16:13.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:16:13.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:16:13.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:16:13.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:16:13.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:16:13.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:16:13.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:16:13.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:16:13.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:c5:5a:b9:7f:f8:b9:81:05:3f:50:f8:33:ed:68:fa:11:f6:6d:da]
            modulus: bdfdce485ae4ea7ac07d7b14bf7c5cfee8813a1e13d2e075b80d7dee324c164bef9051bbfccb7b0af4c1ccdfc5b3f6cbf1fe0edef6a2b117aca6729b3ab7520bf92218beb81c9719584d34745464b0b4c5968bd632bd2b96bb285096e1aadb6f440a340c9873894ec9a6e421be937c8dffd43b55295d578957f36cf27dc5d3175b13621d7cd9b09e7d506514be38f064c694aba81fe6edeb84b471a32d91d9c027c033a318cfa1114e964e7bba12bb88b0f6027415f76cecff5f03633d6ccc18d503aefd325b317808e5cebfe45c395f45cd64fd939f214d8230be0805fbc40fbaa197ab541575bbfdebf5c305916219cd974606ce4fa5c6058d648f6e99407b
    public exponent: 10001

] 
2022-06-08 05:16:57.056  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:16:57.057 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:16:57.059 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-08 05:16:57.060 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:16:57.060  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-08 05:16:57.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:16:57.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:16:57.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:16:57.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:16:57.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:16:57.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:16:57.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:16:57.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:16:57.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:16:57.427  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:16:57.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:16:57.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:16:57.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:16:57.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:16:57.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:16:57.432 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:16:57.432 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:16:57.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:16:57.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:16:57.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:16:57.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:16:57.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:16:57.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:16:57.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:16:57.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:16:57.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:96:6d:7f:a2:af:67:93:da:5f:9e:6b:1c:90:84:7a:fd:61:2b:6d]
            modulus: d5010d53b1bf9b8816dff11c152f690b9978f19e77db189a9673751b279554f83823005a05891663f2a30ef2fa271036c135a2e8bac031d27d4fd4a1a3c01535193d6dddc89ae1694802b0031906ecef2f607a783dee55d3260bde8c54db209a02214b8a62a30fa0cbe9925f33119b166530cc818a36fc2447946b390c62ac02196544298cc3e9c29f41d6c1df6373a5a0aa1014ead9f2b5e611a21125df5836822b758bc6ca81ec16d8a465f1aa0eec290c136c06689505920a8151e7d04d5dd6d24d0e7342fa20a7d252d4f65694afdfccec032b0dfa52fc08d605c147d0fffaac6260115178dd67d2df2f6053771e625291855a98b42bbf929c89b27507d1
    public exponent: 10001

] 
2022-06-08 05:17:14.891  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:17:14.892 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:17:14.893 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-08 05:17:14.894 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:17:14.894  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-08 05:17:14.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:17:14.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:17:14.895 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:17:14.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:17:14.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:17:14.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:17:14.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:17:14.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:17:14.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:17:15.075  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:17:15.076  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:17:15.076 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:17:15.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:17:15.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:17:15.079  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:17:15.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:17:15.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:17:15.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:17:15.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:17:15.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:17:15.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:17:15.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:17:15.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:17:15.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:17:15.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:17:15.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:a8:f0:d8:2a:31:81:ca:5e:c9:32:a1:24:3d:e0:35:da:c5:b0:03]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:20:31.428  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:20:31.430 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:20:31.432 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:20:31.432 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:20:31.435  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:20:31.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:20:31.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:20:31.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:20:31.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:20:31.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:20:31.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:20:31.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:20:31.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:20:31.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:20:31.714  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:20:31.714  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:20:31.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:20:31.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:20:31.717  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:20:31.717  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:20:31.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:20:31.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:20:31.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:20:31.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:20:31.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:20:31.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:20:31.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:20:31.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:20:31.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:20:31.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:20:31.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:20:d2:37:20:64:9e:08:92:21:81:4e:e3:02:de:75:8c:f6:51:7b]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:24:32.763  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:24:32.768 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:24:32.772 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:24:32.774 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:24:32.775  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:24:32.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:24:32.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:24:32.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:24:32.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:24:32.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:24:32.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:24:32.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:24:32.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:24:32.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:24:33.148  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:24:33.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:24:33.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:24:33.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:24:33.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:24:33.152  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:24:33.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:24:33.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:24:33.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:24:33.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:24:33.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:24:33.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:24:33.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:24:33.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:24:33.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:24:33.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:24:33.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:47:41:09:2d:c5:ea:6f:51:ee:05:21:e1:32:82:6d:d3:ae:53:69]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:28:42.245  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:28:42.248 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:28:42.251 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:28:42.253 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:28:42.253  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:28:42.254  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:28:42.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:28:42.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:28:42.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:28:42.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:28:42.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:28:42.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:28:42.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:28:42.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:28:42.492  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:28:42.493  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:28:42.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:28:42.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:28:42.495  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:28:42.495  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:28:42.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:28:42.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:28:42.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:28:42.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:28:42.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:28:42.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:28:42.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:28:42.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:28:42.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:28:42.501 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:28:42.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:23:1a:b7:9a:10:19:56:49:48:e4:29:4a:1f:9e:a5:d3:b1:d5:bc]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:33:07.079  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:33:07.080 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:33:07.082 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:33:07.083 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:33:07.083  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:33:07.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:33:07.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:33:07.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:33:07.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:33:07.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:33:07.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:33:07.093 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:33:07.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:33:07.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:33:07.470  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:33:07.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:33:07.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:33:07.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:33:07.472  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:33:07.472  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:33:07.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:33:07.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:33:07.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:33:07.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:33:07.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:33:07.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:33:07.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:33:07.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:33:07.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:33:07.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:33:07.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:04:af:46:49:28:c4:4d:9d:91:4f:75:8e:91:3b:e9:ab:85:5d:cf]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 05:37:56.228  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 05:37:56.230 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 05:37:56.232 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:37:56.233 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 05:37:56.234  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 05:37:56.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 05:37:56.238  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 05:37:56.239 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 05:37:56.239 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 05:37:56.239 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 05:37:56.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 05:37:56.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:37:56.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 05:37:56.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:37:56.520  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 05:37:56.521  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 05:37:56.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 05:37:56.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 05:37:56.522  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 05:37:56.523  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 05:37:56.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:37:56.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:37:56.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:37:56.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:37:56.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:37:56.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:37:56.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 05:37:56.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 05:37:56.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 05:37:56.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 05:37:56.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21621935184125645387826730345168228495382680757
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 03:28:05 UTC 2022
           Final Date: Mon Jun 07 03:28:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:7c:a7:a3:ea:6e:00:8a:ce:15:04:62:48:ac:52:03:15:c8:bd:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 94f0ca456922a33b8cdc1f007e6eaf95ebebb98e
                       ddc9c33cc95597a95b583047e0b2c434730a764c
                       62d324b97beee5c819ce968f4bcc89bdd9da1f43
                       bda3322ce54095780b186616924a033266dc9a05
                       d6a9cfbf374f780a3c4421f21b93092bde445f2b
                       a3f50ee2b971497220891869c02b5f179a33a010
                       7e3570a980647ea2f8d93b46278b967cb2058926
                       a4ecbb1c9803205645288128bc1be6d14a26f353
                       784698c152e10f7e5b5082c7d9ccb7c39defd269
                       0febf4d6abe07fafdbcb1470cc020a994ffd26bf
                       39ab1c0eeeda931edb58a8af6a87e5fe96f94d1c
                       5e377eef943bc4831e0ad631cf8f114d1f9f4450
                       9545ee4f98ef520e99ff26822e0e16fc32f44d30
                       8068a87f08140f6e211769e522ffda8357855f01
                       293b54f20a87ba5dcc77bd2a03c18158addbce95
                       55fd63a52a633b31e595a36385f29e20a78a086c
                       41a5e6e37b708dc0e790a80d8ca3fa8b5d3eaa63
                       7538bda3cbe6b3469dc7c29156ad9be163318bed
                       f9d470479df38eba3fb54e4eea5c9daf6ee7e5aa
                       0cf70ebd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:f9:a3:56:a9:a7:b2:78:09:cf:8c:b4:b7:d0:f3:4a:c8:7e:38:c5]
            modulus: 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
    public exponent: 10001

]