Results

By type

          2022-04-26 05:12:28,626 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-26 05:12:29,753 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-26 05:12:30.759  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 26, 2022 5:12:33 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 26, 2022 5:12:33 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 26, 2022 5:12:33 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 26, 2022 5:12:33 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-26 05:12:33.816 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-26 05:12:34.173  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-26 05:12:34.369  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-26 05:12:35.178 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-26 05:12:35.181 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-26 05:12:35.182 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-26 05:12:35.186 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-26 05:12:35.228 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-04-26 05:12:35.232 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-26 05:12:35.351 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-26 05:12:36.231 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 26, 2022 5:12:37 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-26 05:12:37.309  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.75 seconds (JVM running for 11.852)
Apr 26, 2022 5:13:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-26 05:13:27.643  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 05:13:27.653 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 05:13:27.693 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-26 05:13:27.697 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 05:13:27.768  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-26 05:13:27.772  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 05:13:27.774  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 05:13:27.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 05:13:27.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 05:13:27.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 05:13:27.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 05:13:27.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 05:13:27.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 05:13:27.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 05:13:27.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 05:13:27.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 05:13:28.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 05:13:28.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 05:13:28.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 05:13:28.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 05:13:28.771  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 05:13:28.773  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 05:13:28.774 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 05:13:28.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 05:13:28.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 05:13:28.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 05:13:28.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 05:13:28.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 05:13:28.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 05:13:28.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 05:13:28.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 05:13:28.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 05:13:28.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: bca2e91082e28b86e73f895f25caa6722819869b9a076f8bf4052476ea81ccf3078441d5ef50b39f5f8ac4e9fa029350acdc4d4b62d6b75606e2b5725e59758b6107fb23b4d58a3f684669febdc2de8a51b9a131137008287f5804feb9a1b1bd115a45dbb12410dbf1083a85e9a009f4594567befb91bafea100c38313623198a2422a00da0e444e3c81c433a0da3a2e8c37e5b50262c97129ef547a40f9fe77129840f450c8f1af4055485103ad9df566e10a201ba3953b3260a2be2b72923eee62a58ca7a4dc58f815b9e98496cc8ef8d8dfcece610ce3f0f2ae755018aeb22f0921d9e3f03557ffab11d265338b627eaf398071fcbcafda7175fedad2264c79c1a0739549778bb64a092f3361c8cf193f774af689fa329ae977e7c7bd9897831321eba85f5564faf9cb36921124cde5cde1d01e6b7dd417aa5dc854ea4e381503def493a028d5f85a4f7313e839302a852b67708de2eeb1c95fa8a047c8d4470e4753f685aeb13a0cefc32d2598457b2efb19ad85d5f393485536ebb99c8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:5b:06:5a:cd:cc:c6:dd:ef:54:7f:ff:47:26:77:0b:33:a9:c0:fd]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:36:02.286  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:36:02.289 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:36:02.294 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-26 07:36:02.295 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:36:02.297  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-26 07:36:02.299  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:36:02.300  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:36:02.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:36:02.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:36:02.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:36:02.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:36:02.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:36:02.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:36:02.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:36:02.651  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:36:02.653  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:36:02.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:36:02.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:36:02.657  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:36:02.658  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:36:02.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:36:02.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:36:02.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:36:02.661 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:36:02.662 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:36:02.662 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:36:02.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:36:02.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:36:02.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:36:02.665 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:36:02.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:4b:3e:9d:de:c1:d1:6f:56:0a:21:ee:9d:9f:6f:32:57:21:85:bf]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:36:06.055  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:36:06.056 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:36:06.058 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:36:06.059 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:36:06.060  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:36:06.061  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:36:06.062  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:36:06.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:36:06.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:36:06.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:36:06.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:36:06.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:36:06.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:36:06.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:36:06.208  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:36:06.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:36:06.209 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:36:06.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:36:06.212  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:36:06.213  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:36:06.214 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:36:06.214 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:36:06.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:36:06.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:36:06.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:36:06.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:36:06.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:36:06.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:36:06.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:36:06.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:36:06.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: bca2e91082e28b86e73f895f25caa6722819869b9a076f8bf4052476ea81ccf3078441d5ef50b39f5f8ac4e9fa029350acdc4d4b62d6b75606e2b5725e59758b6107fb23b4d58a3f684669febdc2de8a51b9a131137008287f5804feb9a1b1bd115a45dbb12410dbf1083a85e9a009f4594567befb91bafea100c38313623198a2422a00da0e444e3c81c433a0da3a2e8c37e5b50262c97129ef547a40f9fe77129840f450c8f1af4055485103ad9df566e10a201ba3953b3260a2be2b72923eee62a58ca7a4dc58f815b9e98496cc8ef8d8dfcece610ce3f0f2ae755018aeb22f0921d9e3f03557ffab11d265338b627eaf398071fcbcafda7175fedad2264c79c1a0739549778bb64a092f3361c8cf193f774af689fa329ae977e7c7bd9897831321eba85f5564faf9cb36921124cde5cde1d01e6b7dd417aa5dc854ea4e381503def493a028d5f85a4f7313e839302a852b67708de2eeb1c95fa8a047c8d4470e4753f685aeb13a0cefc32d2598457b2efb19ad85d5f393485536ebb99c8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:9e:62:1f:f2:74:94:d2:33:d2:6f:2d:31:2b:13:26:a1:e9:c0:9d]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:37:54.766  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:37:54.770 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:37:54.773 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-26 07:37:54.774 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:37:54.775  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-26 07:37:54.776  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:37:54.777  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:37:54.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:37:54.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:37:54.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:37:54.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:37:54.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:37:54.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:37:54.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:37:55.000  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:37:55.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:37:55.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:37:55.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:37:55.005  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:37:55.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:37:55.019 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:37:55.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:37:55.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:37:55.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:37:55.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:37:55.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:37:55.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:37:55.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:37:55.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:37:55.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:37:55.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: bca2e91082e28b86e73f895f25caa6722819869b9a076f8bf4052476ea81ccf3078441d5ef50b39f5f8ac4e9fa029350acdc4d4b62d6b75606e2b5725e59758b6107fb23b4d58a3f684669febdc2de8a51b9a131137008287f5804feb9a1b1bd115a45dbb12410dbf1083a85e9a009f4594567befb91bafea100c38313623198a2422a00da0e444e3c81c433a0da3a2e8c37e5b50262c97129ef547a40f9fe77129840f450c8f1af4055485103ad9df566e10a201ba3953b3260a2be2b72923eee62a58ca7a4dc58f815b9e98496cc8ef8d8dfcece610ce3f0f2ae755018aeb22f0921d9e3f03557ffab11d265338b627eaf398071fcbcafda7175fedad2264c79c1a0739549778bb64a092f3361c8cf193f774af689fa329ae977e7c7bd9897831321eba85f5564faf9cb36921124cde5cde1d01e6b7dd417aa5dc854ea4e381503def493a028d5f85a4f7313e839302a852b67708de2eeb1c95fa8a047c8d4470e4753f685aeb13a0cefc32d2598457b2efb19ad85d5f393485536ebb99c8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:ad:c0:cb:f5:44:cf:f5:9b:76:2a:77:a9:00:82:36:95:3b:10:5d]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:39:50.451  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:39:50.452 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:39:50.454 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-26 07:39:50.455 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:39:50.455  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-26 07:39:50.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:39:50.458  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:39:50.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:39:50.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:39:50.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:39:50.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:39:50.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:39:50.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:39:50.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:39:50.658  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:39:50.658  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:39:50.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:39:50.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:39:50.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:39:50.663  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:39:50.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:39:50.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:39:50.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:39:50.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:39:50.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:39:50.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:39:50.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:39:50.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:39:50.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:39:50.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:39:50.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:28:91:b6:90:aa:84:8c:17:44:84:eb:65:ac:07:85:51:72:f4:52]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:41:34.675  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:41:34.676 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:41:34.678 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-26 07:41:34.679 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:41:34.680  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-26 07:41:34.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:41:34.681  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:41:34.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:41:34.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:41:34.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:41:34.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:41:34.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:41:34.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:41:34.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:41:34.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:41:34.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:41:34.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:41:34.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:41:34.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:41:34.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:41:34.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:41:34.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:41:34.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:41:34.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:41:34.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:41:34.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:41:34.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:41:34.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:41:34.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:41:34.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:41:34.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:ce:d5:37:93:2c:53:06:3c:3f:5d:90:47:f9:82:a3:c6:a9:bb:ad]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:42:05.959  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:42:05.960 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:42:05.962 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-26 07:42:05.963 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:42:05.963  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-26 07:42:05.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:42:05.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:42:05.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:42:05.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:42:05.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:42:05.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:42:05.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:42:05.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:42:05.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:42:06.199  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:42:06.199  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:42:06.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:42:06.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:42:06.202  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:42:06.202  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:42:06.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:42:06.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:42:06.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:42:06.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:42:06.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:42:06.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:42:06.205 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:42:06.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:42:06.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:42:06.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:42:06.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:21:4f:70:c5:28:9a:21:47:55:d4:06:b5:c1:6c:83:a9:f6:74:18]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:43:01.646  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:43:01.649 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:43:01.652 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:43:01.654 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:43:01.654  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:43:01.655  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:43:01.656  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:43:01.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:43:01.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:43:01.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:43:01.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:43:01.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:43:01.665 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:43:01.665 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:43:01.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:43:01.938  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:43:01.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:43:01.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:43:01.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:43:01.944  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:43:01.945 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:43:01.946 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:43:01.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:43:01.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:43:01.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:43:01.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:43:01.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:43:01.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:43:01.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:43:01.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:43:01.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:ee:88:df:4d:91:9e:20:5b:be:c9:4d:fa:5c:ea:63:d0:bf:d2:cd]
            modulus: bd88ff9eab37690ee1b95d951cf1e13b973e9ab3ce83caec30a680aff7c4ad905bbea4fefb0e5924aebd8058f04444d0917646159aa223a18f55bbf900b3b434a07a72826d07d74c6a16ae993653b4b9f975b2bb9061a081cccbe0e3b4d8383e7b4245148343bd1a962402814dc10d33e84302889a95a042738c2b21716c3a55cf32170125e6cd57fa33ae1231a161742054ab2dd2ecd6f7bcd87589984dc5b280f82e775fae0240d6bb47b63c94817b3d92a086bb7986c043d577c6e0742c37ad9ef9c688451b10952ca4fee665efef5acd270861b467928c3e7bd0fa28f0f22aa1f9dbca4c800ec9f03a2e436ffe4b6e9b4f5a085b9f634bc9ce09e1d2765d
    public exponent: 10001

] 
2022-04-26 07:46:32.360  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:46:32.362 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:46:32.364 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:46:32.365 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:46:32.366  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:46:32.366  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:46:32.367  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:46:32.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:46:32.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:46:32.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:46:32.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:46:32.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:46:32.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:46:32.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:46:32.563  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:46:32.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:46:32.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:46:32.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:46:32.566  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:46:32.566  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:46:32.566 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:46:32.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:46:32.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:46:32.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:46:32.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:46:32.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:46:32.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:46:32.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:46:32.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:46:32.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:46:32.574 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: bca2e91082e28b86e73f895f25caa6722819869b9a076f8bf4052476ea81ccf3078441d5ef50b39f5f8ac4e9fa029350acdc4d4b62d6b75606e2b5725e59758b6107fb23b4d58a3f684669febdc2de8a51b9a131137008287f5804feb9a1b1bd115a45dbb12410dbf1083a85e9a009f4594567befb91bafea100c38313623198a2422a00da0e444e3c81c433a0da3a2e8c37e5b50262c97129ef547a40f9fe77129840f450c8f1af4055485103ad9df566e10a201ba3953b3260a2be2b72923eee62a58ca7a4dc58f815b9e98496cc8ef8d8dfcece610ce3f0f2ae755018aeb22f0921d9e3f03557ffab11d265338b627eaf398071fcbcafda7175fedad2264c79c1a0739549778bb64a092f3361c8cf193f774af689fa329ae977e7c7bd9897831321eba85f5564faf9cb36921124cde5cde1d01e6b7dd417aa5dc854ea4e381503def493a028d5f85a4f7313e839302a852b67708de2eeb1c95fa8a047c8d4470e4753f685aeb13a0cefc32d2598457b2efb19ad85d5f393485536ebb99c8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:b9:40:87:af:4f:a5:45:94:d3:6f:30:b9:61:1f:3f:65:7e:1c:d9]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:48:30.287  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:48:30.289 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:48:30.292 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:48:30.293 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:48:30.293  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:48:30.294  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:48:30.294  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:48:30.295 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:48:30.295 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:48:30.296 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:48:30.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:48:30.302 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:48:30.302 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:48:30.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:48:30.519  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:48:30.520  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:48:30.520 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:48:30.521 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:48:30.522  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:48:30.523  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:48:30.523 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:48:30.524 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:48:30.524 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:48:30.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:48:30.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:48:30.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:48:30.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:48:30.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:48:30.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:48:30.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:48:30.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:ce:d2:17:cd:8e:cf:d5:a9:20:2d:db:d4:a6:2a:80:31:2a:3a:b0]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 07:53:03.735  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:53:03.738 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:53:03.740 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:53:03.740 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:53:03.741  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:53:03.742  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:53:03.742  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:53:03.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:53:03.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:53:03.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:53:03.749 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:53:03.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:53:03.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:53:03.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:53:04.014  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:53:04.015  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:53:04.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:53:04.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:53:04.017  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:53:04.017  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:53:04.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:53:04.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:53:04.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:53:04.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:53:04.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:53:04.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:53:04.020 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:53:04.020 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:53:04.020 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:53:04.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:53:04.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:db:c6:22:cb:6d:9a:2b:3b:5e:02:19:58:f4:ee:6c:e3:03:57:a0]
            modulus: c8f093c81b49d732459c4ad7ca62becc9a565469aec3ea8c667a48c63a4b59975735fe2a6b87d1e9b32bca0680648c65b15788e6fdad4f655c3f662e47a4445cbd06209b0db9591c34cfc1b20fc735fec99b06ab34ee7ac191cacb541d5ef1e5b4b8bf5bb3de2b8cd6a916926a496f0f7ecfc73b045b92cc964a48fd5235f13103096743bba1eed7db795d4aa0f5adbbb9fe9abe8ec00914412595b817e012095803989bef8fd2607b4280807aeac8cdd2e4b1a21ce05a1429e65bf4b419382ad3133f81bea2e3fcf9b84157ac3c85a02f927cdb5525c19f1f6178c11ec87915dd399d34eab8488a5930b0164498180ee690934c4e9bb218ce41d2057d34cdf9
    public exponent: 10001

] 
2022-04-26 07:57:19.120  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 07:57:19.123 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 07:57:19.126 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:57:19.127 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 07:57:19.127  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 07:57:19.128  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 07:57:19.128  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 07:57:19.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 07:57:19.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 07:57:19.130 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 07:57:19.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 07:57:19.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:57:19.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 07:57:19.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:57:19.313  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 07:57:19.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 07:57:19.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 07:57:19.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 07:57:19.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 07:57:19.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 07:57:19.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:57:19.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:57:19.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:57:19.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:57:19.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:57:19.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:57:19.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 07:57:19.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 07:57:19.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 07:57:19.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 07:57:19.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:5d:40:1f:b5:0c:6e:98:04:f8:6a:f8:49:89:94:40:bf:ac:78:b6]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 08:01:39.784  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 08:01:39.790 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 08:01:39.793 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:01:39.794 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 08:01:39.795  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:01:39.796  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 08:01:39.797  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 08:01:39.797 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 08:01:39.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 08:01:39.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 08:01:39.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 08:01:39.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:01:39.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:01:39.807 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:01:40.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 08:01:40.055  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 08:01:40.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 08:01:40.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:01:40.057  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 08:01:40.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 08:01:40.058 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:01:40.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:01:40.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:01:40.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:01:40.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:01:40.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:01:40.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:01:40.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:01:40.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:01:40.063 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 08:01:40.070 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:bf:ae:69:db:40:06:bc:de:d7:03:4c:66:c6:5b:4e:af:d1:47:31]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 08:06:35.368  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 08:06:35.372 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 08:06:35.376 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:06:35.378 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 08:06:35.379  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:06:35.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 08:06:35.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 08:06:35.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 08:06:35.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 08:06:35.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 08:06:35.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 08:06:35.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:06:35.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:06:35.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:06:35.577  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 08:06:35.578  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 08:06:35.579 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 08:06:35.579 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:06:35.582  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 08:06:35.582  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 08:06:35.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:06:35.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:06:35.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:06:35.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:06:35.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:06:35.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:06:35.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:06:35.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:06:35.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:06:35.587 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 08:06:35.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:76:fe:8e:68:d1:7c:21:0e:89:09:df:e6:25:0d:0d:f7:2a:f5:7c]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 08:10:52.745  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 08:10:52.748 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 08:10:52.750 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:10:52.751 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 08:10:52.752  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:10:52.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 08:10:52.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 08:10:52.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 08:10:52.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 08:10:52.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 08:10:52.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 08:10:52.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:10:52.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:10:52.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:10:52.923  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 08:10:52.924  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 08:10:52.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 08:10:52.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:10:52.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 08:10:52.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 08:10:52.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:10:52.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:10:52.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:10:52.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:10:52.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:10:52.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:10:52.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:10:52.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:10:52.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:10:52.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 08:10:52.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: bca2e91082e28b86e73f895f25caa6722819869b9a076f8bf4052476ea81ccf3078441d5ef50b39f5f8ac4e9fa029350acdc4d4b62d6b75606e2b5725e59758b6107fb23b4d58a3f684669febdc2de8a51b9a131137008287f5804feb9a1b1bd115a45dbb12410dbf1083a85e9a009f4594567befb91bafea100c38313623198a2422a00da0e444e3c81c433a0da3a2e8c37e5b50262c97129ef547a40f9fe77129840f450c8f1af4055485103ad9df566e10a201ba3953b3260a2be2b72923eee62a58ca7a4dc58f815b9e98496cc8ef8d8dfcece610ce3f0f2ae755018aeb22f0921d9e3f03557ffab11d265338b627eaf398071fcbcafda7175fedad2264c79c1a0739549778bb64a092f3361c8cf193f774af689fa329ae977e7c7bd9897831321eba85f5564faf9cb36921124cde5cde1d01e6b7dd417aa5dc854ea4e381503def493a028d5f85a4f7313e839302a852b67708de2eeb1c95fa8a047c8d4470e4753f685aeb13a0cefc32d2598457b2efb19ad85d5f393485536ebb99c8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:f7:f1:38:4a:6b:ad:ec:26:24:7e:65:3e:62:f8:0f:12:fa:32:cb]
            modulus: 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
    public exponent: 10001

] 
2022-04-26 08:20:16.697  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-26 08:20:16.700 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-26 08:20:16.704 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:20:16.705 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-26 08:20:16.706  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-26 08:20:16.707  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-26 08:20:16.707  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-26 08:20:16.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-26 08:20:16.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-26 08:20:16.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-26 08:20:16.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-26 08:20:16.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:20:16.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-26 08:20:16.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:20:16.891  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-26 08:20:16.892  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-26 08:20:16.892 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-26 08:20:16.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-26 08:20:16.894  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-26 08:20:16.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-26 08:20:16.895 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:20:16.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:20:16.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:20:16.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:20:16.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:20:16.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:20:16.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-26 08:20:16.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-26 08:20:16.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-26 08:20:16.899 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-26 08:20:16.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 70239808633703044135894493298894605999415857677
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 26 05:09:21 UTC 2022
           Final Date: Sun Apr 25 05:09:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:c1:fa:43:2d:ba:af:51:f4:51:8e:0f:cf:da:a2:5f:84:67:0c:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d76eed4ed63c2c67e774944807dbd2f3b6eb281
                       1b727fa970b1d66bf488954d3a45622546db3f8a
                       bcfd6c3daa74b32d8d28852bf700a58d5cd00648
                       7fe02e1e21e06dbd162928b30c188b0735269227
                       cf26457bb520cf38b8428c58d93681a8d3be80cd
                       678b8b62bf62c2405c567338d16d31612a1a16e6
                       40d3a3bd1834fe0a8990be510266b026d101094d
                       0c6eeebf985a90dac085cb9ad77dd85ea1e7c203
                       ff97f0e1753295e0ef2e20c8bb56d332d9ff6dc3
                       eede75dd20341531e9d790ec8a190b7490295e75
                       8e93650073ad3b49d30c661bf6e814914544421c
                       f8b294067248a52f12672a01a182c01d623ec161
                       5e2f27458e06f51d182a1df7e6f3adb0c137ec3e
                       5789bb0ec50ab4beb4d530583d676b79babff229
                       4ad3aff01fff1e9e3ca622e149464cb3824d3192
                       f73f1c96d4fdcba30c0572f2b58b4abf73fdc503
                       82eeacce4e6c09938f59b581b90da65965dd747f
                       66f7cb49326a00c97524f8b349b034e66cf85f6c
                       67f311704f60a4efd19d08fff794f63b1591185c
                       01aca313
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:07:c5:ff:d9:43:e0:8e:4a:4b:51:6d:32:c0:98:40:e1:a3:c5:42]
            modulus: c0138425137e4f6662f52ffa2e4acdb462266a208004194592701a5546975654e3fc3bbf9f5dcc5838f0ed52a019f2c4817806db1312da62b4a55b4e0574975d8b3aa8bbdfa00dc17f1047b2736851404f5ecc66812d6ffd806725e23657d4ab16f557be73fc90a3530dd2203627dbc7e9c790c72b4352935ec09d201ad3a413e5cb75656205d64d0e47d1753f1ccfdb2ba4b0b65217d7b787a37eb8be1f250e8067587076635ef6673e9af2083ab5462491f69f63a8cd3ef7e83d32ae2aa5815771ee484869f8d4497b117397cb4dc30d0e08a58cd0174c0c0235a2c8de23081d3a827e1976f7a9d3ff73e6805fc3d6b61285d9639eebed49380342d2c9530b
    public exponent: 10001

]