Results

By type

          2022-06-22 03:10:04,105 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-22 03:10:05,423 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-22 03:10:06.709  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 22, 2022 3:10:10 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 22, 2022 3:10:10 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 22, 2022 3:10:10 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 22, 2022 3:10:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-22 03:10:11.321 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-22 03:10:11.954  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-22 03:10:12.378  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-22 03:10:14.068 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-22 03:10:14.077 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-22 03:10:14.081 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-22 03:10:14.093 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-22 03:10:14.196 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-06-22 03:10:14.205 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-22 03:10:14.409 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-22 03:10:15.541 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 22, 2022 3:10:16 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-22 03:10:17.109  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 14.503 seconds (JVM running for 17.423)
Jun 22, 2022 3:10:35 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-22 03:10:45.399  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 03:10:45.426 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 03:10:45.554 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-22 03:10:45.564 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 03:10:45.603  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-22 03:10:45.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 03:10:45.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 03:10:45.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 03:10:45.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 03:10:45.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 03:10:45.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 03:10:45.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 03:10:45.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 03:10:45.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 03:10:45.731 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 03:10:45.740 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 03:10:46.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 03:10:46.645  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 03:10:46.647 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 03:10:46.650 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 03:10:46.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 03:10:46.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 03:10:46.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 03:10:46.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 03:10:46.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 03:10:46.700 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 03:10:46.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 03:10:46.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 03:10:46.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 03:10:46.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 03:10:46.716 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 03:10:46.720 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 03:10:46.784 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:84:f1:61:ab:bb:6d:55:53:8e:0b:9c:16:e2:47:48:ae:e4:2c:21]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:35:15.833  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:35:15.837 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:35:15.841 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:35:15.843 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:35:15.844  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:35:15.845  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:35:15.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:35:15.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:35:15.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:35:15.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:35:15.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:35:15.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:35:15.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:35:15.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:35:16.090  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:35:16.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:35:16.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:35:16.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:35:16.100  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:35:16.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:35:16.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:35:16.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:35:16.104 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:35:16.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:35:16.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:35:16.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:35:16.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:35:16.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:35:16.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:35:16.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:35:16.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:0f:d3:db:5d:cc:85:da:c1:f5:43:69:41:6e:0c:6f:8d:f8:92:eb]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:36:57.639  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:36:57.642 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:36:57.644 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-22 04:36:57.646 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:36:57.647  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-22 04:36:57.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:36:57.649  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:36:57.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:36:57.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:36:57.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:36:57.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:36:57.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:36:57.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:36:57.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:36:57.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:36:57.863  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:36:57.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:36:57.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:36:57.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:36:57.873  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:36:57.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:36:57.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:36:57.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:36:57.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:36:57.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:36:57.879 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:36:57.881 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:36:57.881 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:36:57.882 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:36:57.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:36:57.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: b33ae7de415636259516b4a1d121a8624a053122d25c2e89d53d5b79b4657261b22b865e6744492eba4a5454b186643a5a66ef7bf12f64ed4066c9660b92b1cad52cc33c46a00bfdcd838a29c8cebf677539e4a873260629324e05fd8a055da78c1600b59006234e209ab0e0210ed9a701e8423369fc0b0e6c136d9e0625257ddd26679fc7e145fbc68407eb90311ed00ae100541692587589a40567be3fd5091b50f5b497ced0dd858aecc8a5f0e941c6d39fe2482696928d9e95294d905a220b05607b9b447963ccf2620ca8a75b413a4dfef2e016cd63e11b5195b06f3835e06f37db38b88afb6f67f7f5f15b195df35eed05b5d58e7f322b31683e02146bfab31246422582b662a30655a0ac61e9d280c5dc6d19def3954640a50dd63c93faaae959752f8c3f30cb18b56982cddc54c9a2e67f4bad959cf11ade15461e04d30867171bf65cf26b2cd7d7777eb4f1ec7fee1d63d4b63a439cc099147f613d89cda62d329e10c0a42e9b1532370b7c0f59291fcd2c918461b7f299e7f68f47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:e1:b9:57:d1:9c:34:59:61:f1:98:ab:c7:8c:15:ce:bd:e6:af:05]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:38:37.504  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:38:37.508 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:38:37.509 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-22 04:38:37.510 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:38:37.511  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-22 04:38:37.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:38:37.514  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:38:37.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:38:37.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:38:37.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:38:37.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:38:37.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:38:37.535 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:38:37.535 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:38:37.695  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:38:37.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:38:37.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:38:37.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:38:37.719  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:38:37.726  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:38:37.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:38:37.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:38:37.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:38:37.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:38:37.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:38:37.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:38:37.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:38:37.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:38:37.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:38:37.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:38:37.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:ff:dd:37:3a:8e:01:04:df:17:76:89:aa:92:ae:28:a5:f0:dd:d4]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:40:56.322  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:40:56.325 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:40:56.328 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:40:56.330 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:40:56.331  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:40:56.332  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:40:56.340  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:40:56.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:40:56.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:40:56.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:40:56.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:40:56.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:40:56.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:40:56.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:40:56.520  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:40:56.523  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:40:56.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:40:56.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:40:56.528  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:40:56.530  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:40:56.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:40:56.535 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:40:56.536 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:40:56.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:40:56.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:40:56.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:40:56.540 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:40:56.540 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:40:56.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:40:56.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:40:56.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: b33ae7de415636259516b4a1d121a8624a053122d25c2e89d53d5b79b4657261b22b865e6744492eba4a5454b186643a5a66ef7bf12f64ed4066c9660b92b1cad52cc33c46a00bfdcd838a29c8cebf677539e4a873260629324e05fd8a055da78c1600b59006234e209ab0e0210ed9a701e8423369fc0b0e6c136d9e0625257ddd26679fc7e145fbc68407eb90311ed00ae100541692587589a40567be3fd5091b50f5b497ced0dd858aecc8a5f0e941c6d39fe2482696928d9e95294d905a220b05607b9b447963ccf2620ca8a75b413a4dfef2e016cd63e11b5195b06f3835e06f37db38b88afb6f67f7f5f15b195df35eed05b5d58e7f322b31683e02146bfab31246422582b662a30655a0ac61e9d280c5dc6d19def3954640a50dd63c93faaae959752f8c3f30cb18b56982cddc54c9a2e67f4bad959cf11ade15461e04d30867171bf65cf26b2cd7d7777eb4f1ec7fee1d63d4b63a439cc099147f613d89cda62d329e10c0a42e9b1532370b7c0f59291fcd2c918461b7f299e7f68f47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:4b:3a:fb:c4:86:52:84:0b:b7:75:32:dc:2b:89:75:cf:a7:ec:f8]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:44:20.228  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:44:20.230 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:44:20.232 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:44:20.232 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:44:20.233  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:44:20.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:44:20.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:44:20.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:44:20.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:44:20.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:44:20.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:44:20.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:44:20.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:44:20.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:44:20.405  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:44:20.406  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:44:20.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:44:20.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:44:20.409  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:44:20.409  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:44:20.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:44:20.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:44:20.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:44:20.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:44:20.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:44:20.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:44:20.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:44:20.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:44:20.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:44:20.416 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:44:20.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:cb:55:bb:77:e8:4e:80:8e:3d:db:25:d3:49:65:28:48:77:64:08]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:48:08.185  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:48:08.190 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:48:08.208 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:48:08.211 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:48:08.214  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:48:08.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:48:08.216  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:48:08.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:48:08.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:48:08.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:48:08.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:48:08.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:48:08.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:48:08.249 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:48:08.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:48:08.441  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:48:08.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:48:08.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:48:08.443  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:48:08.444  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:48:08.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:48:08.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:48:08.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:48:08.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:48:08.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:48:08.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:48:08.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:48:08.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:48:08.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:48:08.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:48:08.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:a5:32:b3:a9:7e:e8:4d:10:26:8a:4a:4c:07:2f:21:3e:0c:31:77]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:50:02.346  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:50:02.347 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:50:02.349 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:50:02.350 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:50:02.351  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:50:02.351  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:50:02.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:50:02.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:50:02.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:50:02.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:50:02.360 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:50:02.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:50:02.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:50:02.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:50:02.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:50:02.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:50:02.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:50:02.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:50:02.527  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:50:02.527  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:50:02.528 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:50:02.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:50:02.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:50:02.530 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:50:02.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:50:02.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:50:02.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:50:02.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:50:02.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:50:02.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:50:02.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: b33ae7de415636259516b4a1d121a8624a053122d25c2e89d53d5b79b4657261b22b865e6744492eba4a5454b186643a5a66ef7bf12f64ed4066c9660b92b1cad52cc33c46a00bfdcd838a29c8cebf677539e4a873260629324e05fd8a055da78c1600b59006234e209ab0e0210ed9a701e8423369fc0b0e6c136d9e0625257ddd26679fc7e145fbc68407eb90311ed00ae100541692587589a40567be3fd5091b50f5b497ced0dd858aecc8a5f0e941c6d39fe2482696928d9e95294d905a220b05607b9b447963ccf2620ca8a75b413a4dfef2e016cd63e11b5195b06f3835e06f37db38b88afb6f67f7f5f15b195df35eed05b5d58e7f322b31683e02146bfab31246422582b662a30655a0ac61e9d280c5dc6d19def3954640a50dd63c93faaae959752f8c3f30cb18b56982cddc54c9a2e67f4bad959cf11ade15461e04d30867171bf65cf26b2cd7d7777eb4f1ec7fee1d63d4b63a439cc099147f613d89cda62d329e10c0a42e9b1532370b7c0f59291fcd2c918461b7f299e7f68f47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:26:f0:d9:62:ff:8c:61:f2:19:6d:ea:25:74:84:a4:ec:53:c5:32]
            modulus: aed2c349920c4a739795c09943758a046c2e882efe20410dc5587c5983f06a38d31292ab9285947ae32cb31f94b7e2efaddeb305d65935b5407e0b4a07e4eab10e807291639f1438599e23a20f92d37f9e98df37e8f44ad91142a5f2b2b6ce679f8172279a3371b90626953884636b9ceb0695bcc609954d4454ac5dee77886ed58ed72d02e7543f70702dd1739be04f482fd0e0b580734a487d480b374bae49cc0a5cc883efd9b86bc600dd9bc03d7710b00c3678eeed6ae519b1251dd235c2585e14e23c22aa0004da09ce81f2685568f27149825242dcecd9352e5c21cd0b4d4f0205df4e28c077746f50380ee0d55560b71356f49de1bdd61045e4a19ecb
    public exponent: 10001

] 
2022-06-22 04:52:20.919  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:52:20.922 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:52:20.926 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:52:20.927 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:52:20.928  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:52:20.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:52:20.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:52:20.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:52:20.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:52:20.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:52:20.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:52:20.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:52:20.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:52:20.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:52:21.095  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:52:21.097  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:52:21.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:52:21.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:52:21.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:52:21.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:52:21.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:52:21.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:52:21.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:52:21.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:52:21.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:52:21.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:52:21.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:52:21.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:52:21.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:52:21.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:52:21.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:94:8c:3f:c5:be:04:1e:db:73:8e:8d:6e:45:72:5c:b9:0e:08:3c]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 04:55:24.912  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:55:24.914 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:55:24.916 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-22 04:55:24.917 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:55:24.918  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-22 04:55:24.919  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:55:24.920  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:55:24.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:55:24.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:55:24.923 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:55:24.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:55:24.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:55:24.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:55:24.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:55:25.087  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:55:25.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:55:25.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:55:25.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:55:25.091  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:55:25.092  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:55:25.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:55:25.093 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:55:25.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:55:25.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:55:25.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:55:25.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:55:25.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:55:25.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:55:25.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:55:25.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:55:25.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:89:d6:6a:04:a0:b7:85:86:7d:1b:d0:bf:d5:1f:77:6e:a9:51:6f]
            modulus: b9f1b021f12e66d81e373095281154d0401aba4c1c05da60d346dcf7d26628f1f34c55ada750164d07b8d66abaa06559e2fcc99625f3c1802e6aae4778b364169cf5707b53f2aa783611031c24dc367f7af6e3f3106f6a6a16918c85f0837e3a94ec63603724a0ba0f9531e5bdc59410f7b3bd8a3cfadc251dd2438faf160cdba132e5c150d9a7a4b3b281342a7d5946a58ad8f1c33324227c92bc4cf564e12c3ef5ea24719ce6fcc790dc5a809573dc6ee73c3f1b8568cb7a2a8edba05a2cc3d866ff5eb6396016f87012bcd4185c2e5459c86431d4fdc09d779c067432e7e1308d5ab623fd02b9507504e1bccc3721eddf9f0575b0958e81b2d64bb14f8159
    public exponent: 10001

] 
2022-06-22 04:56:40.820  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 04:56:40.822 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 04:56:40.824 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:56:40.826 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 04:56:40.826  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 04:56:40.827  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 04:56:40.827  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 04:56:40.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 04:56:40.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 04:56:40.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 04:56:40.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 04:56:40.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:56:40.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 04:56:40.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:56:41.021  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 04:56:41.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 04:56:41.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 04:56:41.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 04:56:41.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 04:56:41.026  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 04:56:41.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:56:41.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:56:41.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:56:41.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:56:41.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:56:41.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:56:41.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 04:56:41.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 04:56:41.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 04:56:41.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 04:56:41.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:96:8c:53:22:98:06:e3:13:70:ee:92:e3:2f:0d:8c:d5:2f:75:aa]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 05:00:30.065  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 05:00:30.075 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 05:00:30.084 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-22 05:00:30.089 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 05:00:30.090  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-22 05:00:30.091  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 05:00:30.092  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 05:00:30.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 05:00:30.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 05:00:30.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 05:00:30.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 05:00:30.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:00:30.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:00:30.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:00:30.240  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 05:00:30.241  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 05:00:30.242 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 05:00:30.242 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:00:30.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 05:00:30.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 05:00:30.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:30.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:30.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:30.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:30.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:30.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:30.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:30.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:30.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:30.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 05:00:30.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: b33ae7de415636259516b4a1d121a8624a053122d25c2e89d53d5b79b4657261b22b865e6744492eba4a5454b186643a5a66ef7bf12f64ed4066c9660b92b1cad52cc33c46a00bfdcd838a29c8cebf677539e4a873260629324e05fd8a055da78c1600b59006234e209ab0e0210ed9a701e8423369fc0b0e6c136d9e0625257ddd26679fc7e145fbc68407eb90311ed00ae100541692587589a40567be3fd5091b50f5b497ced0dd858aecc8a5f0e941c6d39fe2482696928d9e95294d905a220b05607b9b447963ccf2620ca8a75b413a4dfef2e016cd63e11b5195b06f3835e06f37db38b88afb6f67f7f5f15b195df35eed05b5d58e7f322b31683e02146bfab31246422582b662a30655a0ac61e9d280c5dc6d19def3954640a50dd63c93faaae959752f8c3f30cb18b56982cddc54c9a2e67f4bad959cf11ade15461e04d30867171bf65cf26b2cd7d7777eb4f1ec7fee1d63d4b63a439cc099147f613d89cda62d329e10c0a42e9b1532370b7c0f59291fcd2c918461b7f299e7f68f47
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:87:56:15:c9:a8:84:e2:ee:36:b2:09:f9:02:a0:8a:91:68:c5:6a]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 05:00:37.949  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 05:00:37.952 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 05:00:37.955 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:00:37.959 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 05:00:37.960  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:00:37.962  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 05:00:37.962  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 05:00:37.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 05:00:37.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 05:00:37.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 05:00:37.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 05:00:37.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:00:37.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:00:37.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:00:38.113  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 05:00:38.114  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 05:00:38.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 05:00:38.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:00:38.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 05:00:38.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 05:00:38.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:38.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:38.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:38.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:38.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:38.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:38.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:38.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:38.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:38.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 05:00:38.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:92:29:b3:09:30:9c:50:fc:6f:9c:23:be:e3:89:74:51:82:47:1c]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 05:00:45.236  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 05:00:45.246 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 05:00:45.248 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-22 05:00:45.252 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 05:00:45.252  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-22 05:00:45.261  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 05:00:45.262  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 05:00:45.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 05:00:45.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 05:00:45.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 05:00:45.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 05:00:45.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:00:45.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:00:45.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:00:45.407  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 05:00:45.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 05:00:45.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 05:00:45.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:00:45.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 05:00:45.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 05:00:45.422 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:45.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:45.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:45.424 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:45.424 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:45.425 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:45.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:00:45.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:00:45.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:00:45.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 05:00:45.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:dc:6d:30:77:2c:57:e6:f0:ea:b9:77:4c:1c:20:04:9e:97:83:16]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 05:05:24.387  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 05:05:24.392 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 05:05:24.396 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:05:24.397 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 05:05:24.398  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:05:24.399  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 05:05:24.400  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 05:05:24.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 05:05:24.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 05:05:24.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 05:05:24.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 05:05:24.414 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:05:24.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:05:24.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:05:24.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 05:05:24.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 05:05:24.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 05:05:24.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:05:24.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 05:05:24.612  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 05:05:24.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:05:24.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:05:24.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:05:24.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:05:24.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:05:24.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:05:24.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:05:24.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:05:24.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:05:24.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 05:05:24.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:db:aa:01:a0:74:1d:89:f6:2a:e7:d8:f4:0f:3e:1d:0e:9d:f0:d7]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 05:10:14.852  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 05:10:14.857 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 05:10:14.860 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:10:14.864 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 05:10:14.866  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:10:14.867  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 05:10:14.868  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 05:10:14.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 05:10:14.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 05:10:14.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 05:10:14.879 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 05:10:14.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:10:14.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:10:14.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:10:15.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 05:10:15.049  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 05:10:15.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 05:10:15.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:10:15.052  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 05:10:15.052  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 05:10:15.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:10:15.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:10:15.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:10:15.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:10:15.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:10:15.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:10:15.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:10:15.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:10:15.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:10:15.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 05:10:15.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:07:3e:c1:3a:31:4e:21:7b:8f:44:17:40:bc:96:c0:31:90:11:6f]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 05:14:32.142  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 05:14:32.144 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 05:14:32.146 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:14:32.147 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 05:14:32.148  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 05:14:32.149  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 05:14:32.149  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 05:14:32.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 05:14:32.150 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 05:14:32.150 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 05:14:32.161 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 05:14:32.162 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:14:32.162 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 05:14:32.163 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:14:32.290  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 05:14:32.291  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 05:14:32.291 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 05:14:32.292 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 05:14:32.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 05:14:32.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 05:14:32.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:14:32.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:14:32.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:14:32.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:14:32.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:14:32.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:14:32.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 05:14:32.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 05:14:32.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 05:14:32.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 05:14:32.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 219413301015512759849236217552561261522561074676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 03:07:58 UTC 2022
           Final Date: Mon Jun 21 03:07:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:bc:09:e5:2d:8a:cf:1f:f2:ba:2e:93:11:b7:27:48:19:e2:fa:92]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7b333d3e88035126b23e4338258c26cd61f215ac
                       b5499c73e9f86e1614b13eac5ca0703d8bb786ad
                       3f3feed855deab497b65d0eeb422be30cd963d71
                       94d79ad1c9f2e7347d50dc2bd240d0519686fcef
                       f74a76fa367ab1102a8c19fc3d09b8872309d615
                       b9c65403a1d205dd63f7e3dba15e7664b8d09d00
                       c88f9d9483b6d178b81c0d8b5994ec52938db808
                       f6412d47cc83a5c8549625335601e8a348cc2227
                       6e36501295034dc0114fa9fd3b069379dad1b134
                       cfd38b03ee4c8839e66a549e1ae90e0619fc32a8
                       7718c3506bb888bf743507defc313a45cea1d264
                       b28ecf0741a812aa0713a990261408e6a49e24a6
                       129f1c9e936c65e659e48f0641b47e632426214f
                       57e1cd5374183175f5b411d9135cd96fd4e28acc
                       347bfaad9b25c464bd78041697f775e4094b3a36
                       3ff5558242fd9cd934b7d3651ab7648523bf56f1
                       18d64920c2a973bc1e87023853b88fb4cc669cc9
                       3fee40e30cbc8da3331e3e11136fb735e65a3561
                       0be775950f0a2d9a326caac29baac927da021117
                       bb338666
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:43:b2:f7:4c:d3:cd:a9:64:e5:d4:5e:e5:09:da:a7:5d:9d:70:72]
            modulus: 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
    public exponent: 10001

]