Results

By type

          2022-06-10 03:18:31,978 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-10 03:18:33,390 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-10 03:18:34.449  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 10, 2022 3:18:36 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 10, 2022 3:18:36 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 10, 2022 3:18:36 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 10, 2022 3:18:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-10 03:18:37.788 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-10 03:18:38.104  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-10 03:18:38.345  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-10 03:18:39.235 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-10 03:18:39.238 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-10 03:18:39.240 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-10 03:18:39.244 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-10 03:18:39.288 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-10 03:18:39.292 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-10 03:18:39.476 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-10 03:18:40.184 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 10, 2022 3:18:41 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-10 03:18:41.391  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.535 seconds (JVM running for 12.805)
Jun 10, 2022 3:19:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-10 03:19:42.533  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 03:19:42.546 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 03:19:42.591 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-10 03:19:42.597 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 03:19:42.626  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-10 03:19:42.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 03:19:42.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 03:19:42.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 03:19:42.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 03:19:42.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 03:19:42.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 03:19:42.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 03:19:42.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 03:19:42.704 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 03:19:42.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 03:19:42.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 03:19:43.456  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 03:19:43.460  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 03:19:43.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 03:19:43.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 03:19:43.476  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 03:19:43.478  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 03:19:43.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 03:19:43.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 03:19:43.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 03:19:43.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 03:19:43.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 03:19:43.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 03:19:43.514 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 03:19:43.515 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 03:19:43.515 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 03:19:43.518 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 03:19:43.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:9c:4e:57:d7:fa:fd:8d:30:b2:a4:2b:ef:a0:bd:0e:67:6d:44:f5]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 04:41:05.768  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 04:41:05.772 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 04:41:05.776 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:41:05.778 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 04:41:05.779  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:41:05.780  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 04:41:05.780  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 04:41:05.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 04:41:05.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 04:41:05.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 04:41:05.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 04:41:05.814 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:41:05.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:41:05.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:41:06.162  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 04:41:06.163  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 04:41:06.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 04:41:06.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:41:06.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 04:41:06.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 04:41:06.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:41:06.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:41:06.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:41:06.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:41:06.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:41:06.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:41:06.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:41:06.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:41:06.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:41:06.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 04:41:06.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:b3:44:f0:6b:15:b0:9e:ca:28:b1:9f:f1:b6:8a:4e:7b:98:9b:c0]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 04:42:54.260  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 04:42:54.262 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 04:42:54.266 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-10 04:42:54.267 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 04:42:54.268  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-10 04:42:54.269  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 04:42:54.269  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 04:42:54.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 04:42:54.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 04:42:54.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 04:42:54.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 04:42:54.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:42:54.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:42:54.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:42:54.488  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 04:42:54.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 04:42:54.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 04:42:54.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:42:54.492  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 04:42:54.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 04:42:54.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:42:54.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:42:54.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:42:54.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:42:54.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:42:54.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:42:54.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:42:54.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:42:54.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:42:54.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 04:42:54.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:3b:56:10:31:8c:0c:d5:45:63:08:f4:b2:58:1d:40:09:5d:62:fd]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 04:45:20.792  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 04:45:20.804 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 04:45:20.815 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-10 04:45:20.817 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 04:45:20.818  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-10 04:45:20.820  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 04:45:20.821  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 04:45:20.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 04:45:20.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 04:45:20.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 04:45:20.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 04:45:20.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:45:20.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:45:20.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:45:21.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 04:45:21.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 04:45:21.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 04:45:21.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:45:21.204  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 04:45:21.204  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 04:45:21.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:45:21.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:45:21.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:45:21.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:45:21.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:45:21.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:45:21.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:45:21.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:45:21.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:45:21.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 04:45:21.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:43:04:12:fa:6c:4e:f3:91:34:51:41:77:a2:a2:1f:0c:99:1a:84]
            modulus: dd92c970892224adc3c675f05c62fef9bf7b8777270d3f2985ce8e3d179fac0f61ceea6a5879b2883943a8681576f1e43b822cc7931b60549c306e7b22dfa598f11854189ca9b07afcd87d73ae8768e0ccef787ef8bcfb52df103192a333b8dab06329049466adbb84ceb3be27f902fba5e2dd28997b63963524c007c719a1d229099003e70472b4e159b6078f3d83e96156df75b63159eb18857caede7cbed4e01f9a9a4dc7e89406632eb26015cd36dba6475cb472c4a833f3f0efd6bbc1554ab97a8ecd487b50f8aafe13b627e7b9d0377ea1bf008348220b6d9da89b98d43eb36356b5836731152beba53b575436667b6329c38c9196fab82998faa249cb
    public exponent: 10001

] 
2022-06-10 04:47:22.423  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 04:47:22.426 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 04:47:22.429 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:47:22.430 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 04:47:22.431  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:47:22.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 04:47:22.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 04:47:22.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 04:47:22.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 04:47:22.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 04:47:22.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 04:47:22.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:47:22.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:47:22.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:47:22.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 04:47:22.864  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 04:47:22.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 04:47:22.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:47:22.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 04:47:22.871  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 04:47:22.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:47:22.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:47:22.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:47:22.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:47:22.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:47:22.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:47:22.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:47:22.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:47:22.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:47:22.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 04:47:22.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:22:60:56:35:d3:db:0c:a0:b8:79:04:f6:ea:16:2e:16:eb:1e:34]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 04:51:40.856  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 04:51:40.861 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 04:51:40.865 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:51:40.867 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 04:51:40.868  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:51:40.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 04:51:40.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 04:51:40.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 04:51:40.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 04:51:40.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 04:51:40.889 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 04:51:40.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:51:40.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:51:40.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:51:41.233  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 04:51:41.235  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 04:51:41.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 04:51:41.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:51:41.238  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 04:51:41.239  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 04:51:41.241 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:51:41.242 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:51:41.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:51:41.245 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:51:41.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:51:41.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:51:41.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:51:41.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:51:41.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:51:41.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 04:51:41.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:33:43:4c:f4:37:79:75:64:0f:a0:db:e8:70:b2:42:c1:95:2f:52]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 04:56:41.622  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 04:56:41.632 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 04:56:41.636 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:56:41.637 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 04:56:41.638  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 04:56:41.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 04:56:41.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 04:56:41.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 04:56:41.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 04:56:41.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 04:56:41.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 04:56:41.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:56:41.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 04:56:41.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:56:41.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 04:56:41.938  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 04:56:41.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 04:56:41.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 04:56:41.941  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 04:56:41.942  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 04:56:41.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:56:41.946 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:56:41.946 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:56:41.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:56:41.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:56:41.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:56:41.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 04:56:41.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 04:56:41.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 04:56:41.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 04:56:41.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:ba:d2:c5:4b:c1:90:fb:e4:26:76:66:cc:78:47:8a:1e:43:2b:96]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:01:41.462  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:01:41.464 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:01:41.467 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:01:41.469 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:01:41.469  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:01:41.472  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:01:41.472  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:01:41.473 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:01:41.473 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:01:41.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:01:41.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:01:41.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:01:41.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:01:41.483 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:01:41.798  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:01:41.800  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:01:41.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:01:41.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:01:41.805  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:01:41.806  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:01:41.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:01:41.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:01:41.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:01:41.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:01:41.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:01:41.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:01:41.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:01:41.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:01:41.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:01:41.828 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:01:41.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: d849cf40da09eadd536bc62b7860eed9f6ca4e550def74d0bdd39add7ff138e2b4eb28d8702e9b61541b233a166098cbeaf144a2b58c66e80cb832cbb3276d68dae2edb535077effec6fb4adf2871557879e90e4a5e0e3182721a8b9a167b83a416e787ad912ed16f7f288b12a8ec46abb1ef650eb7400e76b0a72b35cb455d09eca7a5c2351f9efca0002134f65b7bb778fea659e1d2809ae88a8e607ddcd993fe724332d48a690e4bcf5502588250e420b6b1df1f24831842034e7746096f4033e2009ec83d40d52c471a79cafeddb98ab8a6bed2129f91d152c77b3701d98fd519b0dd0e50f93cbc4b80dcd108be9ad205a0a6790a53ae8f93e68a165e6b2de2d2ec64ba9097adde93e34dbc75157db2069a61180ed8c0fe51c207db642e48af6217e66c97b67d5221337883f501afcc9ec7ebfd41bd89a4e8d2a5b346d0b8bff17ee231fdea192680269872c336d09826af3a0d5ff7b8e6d45f53116b81c0fc2462d96eb6b96371df923da6da3cd0088dc2a8000bf8e128b77336b3e3ce5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:bd:db:41:f6:20:5f:fd:01:e5:5e:fd:14:c3:76:dd:44:e0:c6:e1]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:05:45.115  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:05:45.118 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:05:45.121 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:05:45.122 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:05:45.123  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:05:45.124  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:05:45.124  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:05:45.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:05:45.125 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:05:45.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:05:45.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:05:45.135 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:05:45.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:05:45.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:05:45.383  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:05:45.384  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:05:45.384 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:05:45.385 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:05:45.387  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:05:45.388  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:05:45.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:05:45.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:05:45.390 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:05:45.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:05:45.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:05:45.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:05:45.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:05:45.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:05:45.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:05:45.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:05:45.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:50:b7:df:65:7b:08:6f:a8:6c:04:23:6e:19:f7:07:c3:26:8b:88]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:09:10.269  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:09:10.271 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:09:10.274 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-10 05:09:10.275 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:09:10.275  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-10 05:09:10.276  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:09:10.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:09:10.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:09:10.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:09:10.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:09:10.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:09:10.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:09:10.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:09:10.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:09:10.918  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:09:10.919  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:09:10.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:09:10.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:09:10.923  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:09:10.924  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:09:10.925 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:09:10.925 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:09:10.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:09:10.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:09:10.933 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:09:10.935 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:09:10.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:09:10.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:09:10.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:09:10.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:09:10.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:d3:56:27:05:34:ad:ff:9d:ab:53:37:8e:98:71:25:ca:b8:0c:35]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:11:10.707  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:11:10.711 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:11:10.719 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:11:10.721 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:11:10.722  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:11:10.723  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:11:10.723  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:11:10.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:11:10.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:11:10.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:11:10.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:11:10.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:11:10.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:11:10.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:11:11.188  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:11:11.190  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:11:11.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:11:11.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:11:11.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:11:11.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:11:11.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:11:11.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:11:11.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:11:11.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:11:11.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:11:11.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:11:11.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:11:11.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:11:11.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:11:11.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:11:11.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: d849cf40da09eadd536bc62b7860eed9f6ca4e550def74d0bdd39add7ff138e2b4eb28d8702e9b61541b233a166098cbeaf144a2b58c66e80cb832cbb3276d68dae2edb535077effec6fb4adf2871557879e90e4a5e0e3182721a8b9a167b83a416e787ad912ed16f7f288b12a8ec46abb1ef650eb7400e76b0a72b35cb455d09eca7a5c2351f9efca0002134f65b7bb778fea659e1d2809ae88a8e607ddcd993fe724332d48a690e4bcf5502588250e420b6b1df1f24831842034e7746096f4033e2009ec83d40d52c471a79cafeddb98ab8a6bed2129f91d152c77b3701d98fd519b0dd0e50f93cbc4b80dcd108be9ad205a0a6790a53ae8f93e68a165e6b2de2d2ec64ba9097adde93e34dbc75157db2069a61180ed8c0fe51c207db642e48af6217e66c97b67d5221337883f501afcc9ec7ebfd41bd89a4e8d2a5b346d0b8bff17ee231fdea192680269872c336d09826af3a0d5ff7b8e6d45f53116b81c0fc2462d96eb6b96371df923da6da3cd0088dc2a8000bf8e128b77336b3e3ce5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:b9:a8:86:30:ba:8b:3d:ec:f1:cf:ce:f5:f4:12:54:7b:60:c6:b1]
            modulus: cb0d75338087b986a5d9730a9401e1feb4595bba2c5ced45839fee3af41d0e74545b06b229a6560d3349136866922fc6483bcecc0b3da512fa4e8361c4ac028ceee37abb4c524823f846025800a09990cd2a615bb777813684a8ac3eaa34925215379cdf1ca6880899d5bfc1b927ed7e31db8bc69d85925a1d7b79fb60adfa1ff2a99225071d1be3f77f79f1ae12ceec2708f226a1dd8c06dd4f1feba6b421f7ce8e48b9b638103f538f716671d0868411f05e90c644d167f3f0d6dbc96596feae42d9f7241b4598c2d78f5373ccf65349310406438c2d8ad965acdf945a993791084301d3b5cc6e3e4d03810b382747184569e8c2c5f815bc07077d014a8fcd
    public exponent: 10001

] 
2022-06-10 05:16:46.980  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:16:46.985 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:16:46.988 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:16:46.991 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:16:46.991  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:16:46.992  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:16:46.993  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:16:46.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:16:46.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:16:46.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:16:47.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:16:47.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:16:47.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:16:47.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:16:47.283  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:16:47.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:16:47.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:16:47.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:16:47.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:16:47.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:16:47.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:16:47.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:16:47.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:16:47.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:16:47.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:16:47.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:16:47.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:16:47.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:16:47.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:16:47.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:16:47.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:d2:0c:ca:72:a8:a4:c1:f7:77:0a:01:ec:a8:3e:9f:02:28:f4:53]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:17:01.122  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:17:01.124 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:17:01.127 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-10 05:17:01.128 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:17:01.133  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-10 05:17:01.136  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:17:01.137  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:17:01.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:17:01.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:17:01.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:17:01.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:17:01.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:17:01.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:17:01.173 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:17:02.370  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:17:02.371  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:17:02.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:17:02.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:17:02.376  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:17:02.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:17:02.377 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:17:02.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:17:02.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:17:02.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:17:02.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:17:02.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:17:02.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:17:02.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:17:02.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:17:02.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:17:02.386 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: d849cf40da09eadd536bc62b7860eed9f6ca4e550def74d0bdd39add7ff138e2b4eb28d8702e9b61541b233a166098cbeaf144a2b58c66e80cb832cbb3276d68dae2edb535077effec6fb4adf2871557879e90e4a5e0e3182721a8b9a167b83a416e787ad912ed16f7f288b12a8ec46abb1ef650eb7400e76b0a72b35cb455d09eca7a5c2351f9efca0002134f65b7bb778fea659e1d2809ae88a8e607ddcd993fe724332d48a690e4bcf5502588250e420b6b1df1f24831842034e7746096f4033e2009ec83d40d52c471a79cafeddb98ab8a6bed2129f91d152c77b3701d98fd519b0dd0e50f93cbc4b80dcd108be9ad205a0a6790a53ae8f93e68a165e6b2de2d2ec64ba9097adde93e34dbc75157db2069a61180ed8c0fe51c207db642e48af6217e66c97b67d5221337883f501afcc9ec7ebfd41bd89a4e8d2a5b346d0b8bff17ee231fdea192680269872c336d09826af3a0d5ff7b8e6d45f53116b81c0fc2462d96eb6b96371df923da6da3cd0088dc2a8000bf8e128b77336b3e3ce5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:1b:6e:60:02:fb:c9:2e:2e:c3:94:31:7a:c5:a9:6c:0c:27:c9:77]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:17:27.096  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:17:27.099 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:17:27.102 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-10 05:17:27.105 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:17:27.106  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-10 05:17:27.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:17:27.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:17:27.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:17:27.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:17:27.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:17:27.118 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:17:27.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:17:27.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:17:27.125 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:17:27.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:17:27.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:17:27.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:17:27.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:17:27.556  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:17:27.557  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:17:27.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:17:27.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:17:27.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:17:27.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:17:27.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:17:27.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:17:27.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:17:27.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:17:27.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:17:27.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:17:27.574 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:27:fa:3b:2c:8b:cf:6a:a0:d4:83:eb:28:17:df:1b:dc:ef:a6:54]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:22:21.958  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:22:21.963 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:22:21.969 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:22:21.973 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:22:21.974  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:22:21.975  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:22:21.976  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:22:21.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:22:21.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:22:21.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:22:21.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:22:21.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:22:21.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:22:21.999 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:22:22.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:22:22.369  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:22:22.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:22:22.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:22:22.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:22:22.373  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:22:22.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:22:22.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:22:22.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:22:22.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:22:22.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:22:22.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:22:22.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:22:22.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:22:22.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:22:22.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:22:22.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:55:ac:52:0d:c4:55:27:68:22:3d:e9:d4:65:a7:dc:c7:52:94:56]
            modulus: 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
    public exponent: 10001

] 
2022-06-10 05:31:51.622  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:31:51.631 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:31:51.635 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:31:51.646 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:31:51.647  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:31:51.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:31:51.654  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:31:51.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:31:51.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:31:51.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:31:51.678 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:31:51.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:31:51.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:31:51.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:31:52.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:31:52.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:31:52.224 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:31:52.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:31:52.242  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:31:52.243  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:31:52.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:31:52.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:31:52.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:31:52.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:31:52.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:31:52.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:31:52.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:31:52.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:31:52.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:31:52.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:31:52.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:fe:e0:6f:7e:e7:44:d8:e1:0d:1a:88:39:96:ea:43:c5:a5:71:57]
            modulus: dc040eade9690f08c2311309f97c860e3b32e50bcaf384ca1b8e94a8ddf66777ddfb7df560473a8a0f351e362f159a03599f639e8f9bc719bb94579860cebc230e35722277ca3c009b5c97436deed87a6e6b594d64fa1ef4579c835431855b8eef7144237de38827cd1bc389d75b08463b5983e164bd0031a4736f239b9eda568e85f357472bcb2bdde01328d1979b695fec3584f1eae31776d48af103e14a328f0f32c993aa961a350195cc43e7764ec33c2ecffa89d10100e3829eaebb1321bb804f2b4e4d178c5162d20fa43fbd4ce6f372b68cb2596b6b041d0383f7759487710f79772505aeb574dc6677b80b97b8de8cb90e9e5299c05ed0fadc75dbb1
    public exponent: 10001

] 
2022-06-10 05:36:48.826  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-10 05:36:48.834 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-10 05:36:48.840 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:36:48.841 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-10 05:36:48.842  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-10 05:36:48.842  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-10 05:36:48.843  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-10 05:36:48.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-10 05:36:48.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-10 05:36:48.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-10 05:36:48.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-10 05:36:48.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:36:48.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-10 05:36:48.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:36:49.091  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-10 05:36:49.092  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-10 05:36:49.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-10 05:36:49.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-10 05:36:49.095  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-10 05:36:49.096  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-10 05:36:49.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:36:49.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:36:49.097 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:36:49.097 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:36:49.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:36:49.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:36:49.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-10 05:36:49.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-10 05:36:49.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-10 05:36:49.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-10 05:36:49.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 276475645847386887234437726079458257637053588057
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 10 03:15:46 UTC 2022
           Final Date: Wed Jun 09 03:15:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029
                       0b3a247526a82f72029e460a6abdff71fbfe942d
                       c1f07496f8a6e6c65e2847aca800f80c2f2e4f15
                       14caae714743ed59f4e87b992532eff0e6bea503
                       62f3aecab5c21bc47f2de8ae7020a5f936203114
                       965570fe6f5345a03f0faa12e607dee677d8dcfb
                       9d1f274768baa409d12cf9208929b6758f16e6a1
                       557a1a4c56494e01c2eeb05af51b0d8fd3d25050
                       1e6ca64efab7a88b50975948c437ac634aa716e2
                       9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd
                       ca3542896ba2d8a6b17854947967014d9d83b43e
                       85637babe99547133c89196329b8c75781a52629
                       936e232156ea600790ae9bd371c388a28fdb569a
                       d93ce5030caa6e919ff8299fa7a2badfa0ec6960
                       be6ebbd94cfdc87901dd96e1f46bda85bff357a7
                       3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a
                       2df613f398e5e8f22d6e163cc1c55ef84a540655
                       18a96f66c14625544abaff8547a25299d8d1b927
                       785961d34e6e31498893020f6f4b03c577a34fd0
                       a420bcc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:b6:3d:04:e5:db:72:b3:57:c5:70:58:9e:4c:7e:e3:02:49:57:98]
            modulus: ce76dfe79d636c396d2c9fc51305f28535483c9042ac2646dbcc67ff923cac2105674b016a081746cdcb7f48679f44beb1be02039e9f88eae36dfb7b1fdbcc5172c7c35885313964024014d2d75f316f788f0cc23fbe1923b34aeb2f3137cfb993b0d872158d7aad14dd03b2bd98100bb1b9a67a4f8b07762d095b778e15efd950514925d47ab6abb37c7e50d2908f01ba0bf279a1f770f5817e6beefae5fbc97d4c91eeb51278e5b735fc4463d39e27a2799caa40991f15e79d1eab96d212c15014c690d63feeb8414bce3c7f4dfae776bc0919a952ba8f0845feb8e6cf850e511d2a28a45b3f670a449decdf5a201d793113cde25878c37c9a8bb5a7813e4b
    public exponent: 10001

]