Results

By type

          2022-05-25 05:05:16,672 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-25 05:05:17,797 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-25 05:05:18.430  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 25, 2022 5:05:20 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 25, 2022 5:05:20 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 25, 2022 5:05:20 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 25, 2022 5:05:20 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-25 05:05:20.626 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-25 05:05:20.893  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-25 05:05:21.046  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-25 05:05:21.666 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-25 05:05:21.668 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-25 05:05:21.669 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-25 05:05:21.673 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-25 05:05:21.707 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-25 05:05:21.709 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-25 05:05:21.823 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-25 05:05:22.421 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 25, 2022 5:05:22 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-25 05:05:23.185  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.208 seconds (JVM running for 8.748)
May 25, 2022 5:05:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-25 05:06:00.318  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 05:06:00.330 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 05:06:00.362 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 05:06:00.365 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 05:06:00.379  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 05:06:00.381  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 05:06:00.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 05:06:00.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 05:06:00.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 05:06:00.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 05:06:00.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 05:06:00.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 05:06:00.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 05:06:00.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 05:06:00.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 05:06:00.435 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 05:06:00.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 05:06:00.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 05:06:00.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 05:06:00.982 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 05:06:00.990  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 05:06:00.991  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 05:06:00.992 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 05:06:00.992 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 05:06:00.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 05:06:01.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 05:06:01.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 05:06:01.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 05:06:01.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 05:06:01.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 05:06:01.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 05:06:01.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 05:06:01.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: f2a41342872f01de3138d180e1f932f8e37956f5ed1336f30dfda95ed6a34ffc9157ab9c5e412fb1787bc1b197fe18f2f8fcd26a3b3b1df148c460e2bcea3ec5672aea8d379a2cbe2e6639dca3a08d3470cb00ceed4607c1868975f5958c31255f9dc28210f8f6f6c2283fd71b361d8908cdc30cde6f7966686813323be17bfc3c3b7f0a879018d02cc653da504f39ce45fe174f17e44bf250f161b205f6999477e0caaf0e013bcd7eea8992f9f2ea94d54953e40dc8e15945706a79cd9368f886d64d272d8b28c65951a277cc39654dd25b618149724d54fd14670a612063603b4572eff301cab53fbdb376547846ecea1442f411f8b31a6c1a80cadb59fd45df40a39d01fd4e2c10a6bf54587fe8bdc96575292f00742dd5b1933ac9beb68385df567f138a41d43a0946dbb0649698f7005ef4d3b7712f0ffc04852c504b4c2e579394bb0ffb6b075b288f037701982bad4e42a97fe55495e85867a08ed8982c0373649121fce44ead1b87c88fd75a1506c2eb283a518293d4425dc61ad74f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:3e:4a:32:dd:31:95:23:2b:36:2e:1f:a7:89:01:97:e3:d8:4a:30]
            modulus: bb7ef3b80ac433bd33450c49c8e77a106ed9a15d023d24a3d9989f63c7a68dde72acfc1eecbf888bb6be7e14e6679b4539a2741c7e4e5b0a4ba27bb423a248063d2eabbc975c5ed957ce53cb65205ffc2a9c0a7c13ccafbb53d937288d4ba36e15cb2bf25099d309b10f031b85ff8b9f320ad747c9dea77b2cfe775186c13ada6939738ff7db4efeac42a189f13a4a47cebfcac0abfffc6bdde1c50157a5c9bb55d1dc03f6cb22b396c881d42d9d288504676fd6148dad823b543140bb8a0e7d880cf8b29a59dbdc4984dadccd5a0d8c1ccd1da54697b414d33ff3291fac3ad3d4b178d5dea604e6be07605995000249f958351810be5f4a733ebd6ba1b0d237
    public exponent: 10001

] 
2022-05-25 12:28:33.170  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:28:33.174 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:28:33.177 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:28:33.179 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:28:33.180  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:28:33.181  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:28:33.181  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:28:33.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:28:33.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:28:33.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:28:33.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:28:33.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:28:33.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:28:33.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:28:33.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:28:33.415  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:28:33.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:28:33.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:28:33.418  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:28:33.419  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:28:33.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:28:33.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:28:33.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:28:33.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:28:33.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:28:33.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:28:33.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:28:33.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:28:33.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:28:33.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:28:33.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:0f:92:64:db:cf:b7:67:0b:87:de:1a:66:f6:92:97:87:8f:1f:51]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:30:04.810  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:30:04.811 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:30:04.814 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 12:30:04.814 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:30:04.815  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 12:30:04.815  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:30:04.816  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:30:04.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:30:04.817 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:30:04.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:30:04.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:30:04.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:30:04.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:30:04.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:30:05.016  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:30:05.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:30:05.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:30:05.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:30:05.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:30:05.021  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:30:05.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:30:05.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:30:05.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:30:05.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:30:05.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:30:05.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:30:05.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:30:05.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:30:05.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:30:05.026 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:30:05.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:60:ef:7d:67:bb:cf:a9:33:b2:f6:1b:04:dd:54:f9:95:17:f7:cb]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:31:16.189  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:31:16.191 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:31:16.193 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 12:31:16.194 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:31:16.194  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 12:31:16.195  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:31:16.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:31:16.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:31:16.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:31:16.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:31:16.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:31:16.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:31:16.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:31:16.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:31:16.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:31:16.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:31:16.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:31:16.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:31:16.354  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:31:16.355  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:31:16.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:31:16.356 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:31:16.356 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:31:16.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:31:16.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:31:16.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:31:16.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:31:16.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:31:16.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:31:16.359 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:31:16.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:c7:3e:da:fa:4b:ce:d5:64:dd:56:5d:36:d8:c4:09:3b:72:bb:73]
            modulus: c2ed6d1cb95096218a8e93aa01ab1450bec315925e05299abcc76d7ec07ba0f367f0f5982f01358a3007bbb480a5efed93cdf538141009da486b17f1c1927625eaea36ef00b82cd751eb934315662bf89a57b20af6d8feb3f1dc9cbf87baf2d979a0e58b3655aac17db2d4c412720d3c68feaaba96ef242859bd87c53dd312f1d73dbe5b0518d230993f0111755724df3b0c382e60e6729a6b83c501d8745368774a184440d12cdcef21aa518ac47a40fd15cddc065674eb8893bf160bd76d61e1a84d2b12a7a3f17ba87c277a8b83f50a7d115803e5bf269fcd3f30d391f8fae61eb4485183ed15338dd3c285edd86640fec21103287bc2c83b3115f849a85d
    public exponent: 10001

] 
2022-05-25 12:33:02.544  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:33:02.547 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:33:02.549 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:33:02.550 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:33:02.551  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:33:02.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:33:02.554  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:33:02.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:33:02.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:33:02.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:33:02.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:33:02.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:33:02.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:33:02.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:33:02.706  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:33:02.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:33:02.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:33:02.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:33:02.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:33:02.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:33:02.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:33:02.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:33:02.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:33:02.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:33:02.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:33:02.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:33:02.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:33:02.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:33:02.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:33:02.715 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:33:02.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:d4:7e:35:c2:3a:4e:ed:1a:fc:98:4a:6e:e5:da:34:dd:6e:35:c0]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:36:31.980  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:36:31.982 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:36:31.983 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:36:31.984 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:36:31.985  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:36:31.985  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:36:31.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:36:31.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:36:31.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:36:31.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:36:31.995 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:36:31.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:36:31.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:36:31.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:36:32.127  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:36:32.128  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:36:32.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:36:32.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:36:32.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:36:32.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:36:32.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:36:32.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:36:32.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:36:32.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:36:32.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:36:32.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:36:32.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:36:32.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:36:32.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:36:32.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:36:32.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: f2a41342872f01de3138d180e1f932f8e37956f5ed1336f30dfda95ed6a34ffc9157ab9c5e412fb1787bc1b197fe18f2f8fcd26a3b3b1df148c460e2bcea3ec5672aea8d379a2cbe2e6639dca3a08d3470cb00ceed4607c1868975f5958c31255f9dc28210f8f6f6c2283fd71b361d8908cdc30cde6f7966686813323be17bfc3c3b7f0a879018d02cc653da504f39ce45fe174f17e44bf250f161b205f6999477e0caaf0e013bcd7eea8992f9f2ea94d54953e40dc8e15945706a79cd9368f886d64d272d8b28c65951a277cc39654dd25b618149724d54fd14670a612063603b4572eff301cab53fbdb376547846ecea1442f411f8b31a6c1a80cadb59fd45df40a39d01fd4e2c10a6bf54587fe8bdc96575292f00742dd5b1933ac9beb68385df567f138a41d43a0946dbb0649698f7005ef4d3b7712f0ffc04852c504b4c2e579394bb0ffb6b075b288f037701982bad4e42a97fe55495e85867a08ed8982c0373649121fce44ead1b87c88fd75a1506c2eb283a518293d4425dc61ad74f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:32:53:fd:19:2d:5e:b2:14:ee:08:6c:69:3a:ee:ec:af:00:28:84]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:40:17.674  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:40:17.675 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:40:17.677 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:40:17.677 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:40:17.678  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:40:17.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:40:17.679  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:40:17.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:40:17.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:40:17.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:40:17.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:40:17.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:40:17.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:40:17.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:40:17.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:40:17.808  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:40:17.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:40:17.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:40:17.810  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:40:17.810  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:40:17.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:40:17.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:40:17.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:40:17.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:40:17.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:40:17.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:40:17.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:40:17.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:40:17.814 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:40:17.814 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:40:17.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:9a:2e:53:65:65:1f:11:4f:3d:7f:31:a2:2a:cc:93:de:d0:03:b1]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:42:15.170  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:42:15.172 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:42:15.173 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:42:15.174 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:42:15.174  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:42:15.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:42:15.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:42:15.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:42:15.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:42:15.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:42:15.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:42:15.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:42:15.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:42:15.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:42:15.317  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:42:15.318  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:42:15.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:42:15.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:42:15.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:42:15.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:42:15.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:42:15.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:42:15.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:42:15.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:42:15.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:42:15.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:42:15.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:42:15.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:42:15.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:42:15.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:42:15.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: f2a41342872f01de3138d180e1f932f8e37956f5ed1336f30dfda95ed6a34ffc9157ab9c5e412fb1787bc1b197fe18f2f8fcd26a3b3b1df148c460e2bcea3ec5672aea8d379a2cbe2e6639dca3a08d3470cb00ceed4607c1868975f5958c31255f9dc28210f8f6f6c2283fd71b361d8908cdc30cde6f7966686813323be17bfc3c3b7f0a879018d02cc653da504f39ce45fe174f17e44bf250f161b205f6999477e0caaf0e013bcd7eea8992f9f2ea94d54953e40dc8e15945706a79cd9368f886d64d272d8b28c65951a277cc39654dd25b618149724d54fd14670a612063603b4572eff301cab53fbdb376547846ecea1442f411f8b31a6c1a80cadb59fd45df40a39d01fd4e2c10a6bf54587fe8bdc96575292f00742dd5b1933ac9beb68385df567f138a41d43a0946dbb0649698f7005ef4d3b7712f0ffc04852c504b4c2e579394bb0ffb6b075b288f037701982bad4e42a97fe55495e85867a08ed8982c0373649121fce44ead1b87c88fd75a1506c2eb283a518293d4425dc61ad74f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:48:72:ef:3b:6e:b2:4a:b9:14:dc:24:5b:b7:2b:e0:06:12:19:51]
            modulus: ba470243f794c1b49a6f0fbeaefbf895478b1d94670f4c8afb819b4fe945f4265992063637ceee3e9302f0a289325c09bf21cbc4e1f9e3c91329cf3ccb33eedda584f6fde43fca075f06c2ec671eb915f42324c65a81b802ae5b5a5d66a6e4a22eeb5772f4002d91acc39dafae6ce953f7ada45fd617ac26d4eb309ff8d4bd304dd6717518eb59f2c88fb011c8451676f19d23a5940e7e36384a2355b9cda8a884f919a5d7f983f30c8a2fb1e0c2c3d757e01901e317594dccf6611f259c4effe09d3b1f16d05aeeb92250303cc42d6c4cee95c7ee7abffd395201e4dfe22bf1ab83b3d9b7f1f43d05d860ca8112a4e099321671e7ff81ea5999a1a464cf1bd9
    public exponent: 10001

] 
2022-05-25 12:46:00.611  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:46:00.620 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:46:00.623 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:46:00.624 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:46:00.625  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:46:00.626  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:46:00.626  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:46:00.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:46:00.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:46:00.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:46:00.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:46:00.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:46:00.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:46:00.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:46:00.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:46:00.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:46:00.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:46:00.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:46:00.805  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:46:00.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:46:00.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:46:00.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:46:00.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:46:00.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:46:00.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:46:00.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:46:00.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:46:00.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:46:00.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:46:00.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:46:00.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:7c:2c:b0:15:4c:59:e1:42:88:8b:52:2f:aa:0d:93:d9:85:0a:f8]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:49:40.424  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:49:40.426 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:49:40.427 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:49:40.428 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:49:40.428  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:49:40.429  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:49:40.430  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:49:40.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:49:40.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:49:40.431 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:49:40.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:49:40.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:49:40.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:49:40.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:49:40.577  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:49:40.577  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:49:40.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:49:40.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:49:40.583  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:49:40.583  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:49:40.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:49:40.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:49:40.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:49:40.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:49:40.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:49:40.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:49:40.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:49:40.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:49:40.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:49:40.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:49:40.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:73:6b:10:82:c0:c1:fd:e9:e3:4c:e0:77:52:3a:0c:96:69:d7:a1]
            modulus: e0bbda57fd078e4afd5ae783e2fa7b860aa1d056d50ffd8bdca29e76b62d6366bbf85d65c64ae97812b102f6f5c3da51bf11a4b648cbf336ae9c4cc4a652ca623c5e64dbe59ae029edb5cba5e10d821caaff8f0d138d995240f5c2421a3aa26ee70960b9148c5aafd1a7d6b4586b65fcd0be89c671a57ccb751d424b308182f9132c23bfb57edf96007740de8c47f5738f56721225b6f98c6a692c2c3028b9d2c98189e388820e839ff083921f5a42b0f7792943705f8e697587e37af1471118423589068a2b0def7b9440fe0382febcc45012a1065b7efe99bd2b8d14d326326fd9521659b657f3b4f2379fbd4bd54a689d35214abc787a26fdaee21a183703
    public exponent: 10001

] 
2022-05-25 12:54:10.042  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:54:10.043 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:54:10.045 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:54:10.046 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:54:10.046  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:54:10.046  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:54:10.047  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:54:10.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:54:10.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:54:10.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:54:10.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:54:10.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:54:10.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:54:10.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:54:10.195  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:54:10.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:54:10.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:54:10.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:54:10.197  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:54:10.198  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:54:10.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:54:10.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:54:10.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:54:10.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:54:10.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:54:10.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:54:10.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:54:10.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:54:10.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:54:10.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:54:10.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:14:d1:5c:51:66:46:b6:fd:25:ef:4e:33:1f:01:74:93:3e:4a:0c]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 12:58:03.924  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 12:58:03.926 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 12:58:03.929 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:58:03.930 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 12:58:03.931  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 12:58:03.932  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 12:58:03.932  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 12:58:03.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 12:58:03.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 12:58:03.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 12:58:03.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 12:58:03.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:58:03.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 12:58:03.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:58:04.091  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 12:58:04.091  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 12:58:04.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 12:58:04.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 12:58:04.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 12:58:04.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 12:58:04.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:58:04.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:58:04.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:58:04.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:58:04.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:58:04.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:58:04.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 12:58:04.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 12:58:04.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 12:58:04.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 12:58:04.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: f2a41342872f01de3138d180e1f932f8e37956f5ed1336f30dfda95ed6a34ffc9157ab9c5e412fb1787bc1b197fe18f2f8fcd26a3b3b1df148c460e2bcea3ec5672aea8d379a2cbe2e6639dca3a08d3470cb00ceed4607c1868975f5958c31255f9dc28210f8f6f6c2283fd71b361d8908cdc30cde6f7966686813323be17bfc3c3b7f0a879018d02cc653da504f39ce45fe174f17e44bf250f161b205f6999477e0caaf0e013bcd7eea8992f9f2ea94d54953e40dc8e15945706a79cd9368f886d64d272d8b28c65951a277cc39654dd25b618149724d54fd14670a612063603b4572eff301cab53fbdb376547846ecea1442f411f8b31a6c1a80cadb59fd45df40a39d01fd4e2c10a6bf54587fe8bdc96575292f00742dd5b1933ac9beb68385df567f138a41d43a0946dbb0649698f7005ef4d3b7712f0ffc04852c504b4c2e579394bb0ffb6b075b288f037701982bad4e42a97fe55495e85867a08ed8982c0373649121fce44ead1b87c88fd75a1506c2eb283a518293d4425dc61ad74f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:24:82:ef:46:0c:a8:bd:f5:dc:20:ff:03:be:70:36:80:7d:e1:e3]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 13:01:42.391  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 13:01:42.393 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 13:01:42.394 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 13:01:42.395 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 13:01:42.395  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 13:01:42.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 13:01:42.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 13:01:42.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 13:01:42.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 13:01:42.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 13:01:42.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 13:01:42.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 13:01:42.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 13:01:42.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 13:01:42.564  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 13:01:42.564  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 13:01:42.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 13:01:42.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 13:01:42.566  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 13:01:42.566  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 13:01:42.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 13:01:42.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 13:01:42.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 13:01:42.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 13:01:42.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 13:01:42.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 13:01:42.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 13:01:42.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 13:01:42.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 13:01:42.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 13:01:42.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 234985929768046926459754787994997417310552620388
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 05:02:56 UTC 2022
           Final Date: Mon May 24 05:02:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [02:44:8f:bc:c3:32:b7:73:bd:ad:e6:e8:36:fa:43:b0:85:1d:59:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5989ad293a7842dea87cb96b2890ac2984645aaf
                       83949c45b03c3d97eec11cc3df28f0dba1655d11
                       3ad34b76769c9393983b3b32ccee9e70bd03e41b
                       2a7e22b778ec45f328257ae3aa6635d6e6930ce1
                       530f670a2d217439c3734382cc566df2ba3fdf76
                       64e7e5c7d41acb8ffe6bd4b8139ac29078267644
                       409d054f59c6495993e9e182fc8d0ee579b905ed
                       1ee6a841e962d1fa33e3f123f08b96389637359b
                       87c96ca2d7ee5bcde0debd9f44b22920e1df8427
                       bd349e125c50a37343845dfa35c51f23e945107b
                       3896a499691f3893a39a706d440943d3ec70b7cb
                       94cf04a8d9733348fd8c8b99459681c48e9545e4
                       d471fc5ba5c26a98446668105be2fc0289280c94
                       8e0a4bfcf15407b8f6879c66d1e8eb1c99b40cb2
                       22094df9333ac9041cc3bc842e15d05ca2b0aba1
                       735d437456ac4098b03cb443f8a1d767fe40e25d
                       46af507dad6a1bdbbe124856c1b60e946f405cb8
                       7c6339d0941a84ebbb611e208386ea51b85260c8
                       17ebb175831e36b599ddceefd68957c146ebc489
                       4168bead
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:8b:ac:34:b0:dd:da:64:96:42:20:52:79:ed:22:4c:07:3d:60:fa]
            modulus: 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
    public exponent: 10001

]