Results

By type

          2022-06-09 05:42:18,440 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-09 05:42:20,038 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-09 05:42:21.352  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 09, 2022 5:42:25 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 09, 2022 5:42:25 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 09, 2022 5:42:25 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 09, 2022 5:42:25 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-09 05:42:26.715 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-09 05:42:27.325  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-09 05:42:27.583  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-09 05:42:28.731 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-09 05:42:28.734 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-09 05:42:28.736 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-09 05:42:28.741 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-09 05:42:28.794 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-06-09 05:42:28.799 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-09 05:42:29.070 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-09 05:42:30.121 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 09, 2022 5:42:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-09 05:42:31.821  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 14.907 seconds (JVM running for 18.122)
Jun 09, 2022 5:42:52 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-09 05:43:25.966  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 05:43:25.997 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 05:43:26.174 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-09 05:43:26.192 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 05:43:26.273  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-09 05:43:26.277  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 05:43:26.279  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 05:43:26.281 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 05:43:26.281 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 05:43:26.288 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 05:43:26.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 05:43:26.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 05:43:26.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 05:43:26.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 05:43:26.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 05:43:26.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 05:43:27.548  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 05:43:27.553  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 05:43:27.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 05:43:27.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 05:43:27.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 05:43:27.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 05:43:27.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 05:43:27.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 05:43:27.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 05:43:27.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 05:43:27.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 05:43:27.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 05:43:27.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 05:43:27.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 05:43:27.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 05:43:27.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 05:43:27.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:75:f0:7d:0f:55:71:4d:41:d3:8a:85:b7:09:ea:55:b6:22:b0:cd]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:13:31.882  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:13:31.888 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:13:31.892 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:13:31.893 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:13:31.894  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:13:31.895  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:13:31.896  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:13:31.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:13:31.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:13:31.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:13:31.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:13:31.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:13:31.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:13:31.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:13:32.150  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:13:32.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:13:32.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:13:32.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:13:32.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:13:32.159  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:13:32.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:13:32.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:13:32.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:13:32.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:13:32.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:13:32.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:13:32.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:13:32.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:13:32.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:13:32.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:13:32.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:6f:d3:21:ea:05:18:58:f1:20:41:fe:ba:37:c3:d1:0d:ab:72:c0]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:15:16.930  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:15:16.932 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:15:16.935 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-09 07:15:16.940 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:15:16.942  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-09 07:15:16.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:15:16.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:15:16.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:15:16.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:15:16.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:15:16.975 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:15:16.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:15:16.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:15:16.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:15:17.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:15:17.191  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:15:17.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:15:17.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:15:17.227  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:15:17.241  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:15:17.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:15:17.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:15:17.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:15:17.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:15:17.260 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:15:17.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:15:17.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:15:17.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:15:17.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:15:17.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:15:17.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:e8:ee:90:32:3e:1f:8a:31:36:d1:02:4b:27:60:d2:ae:f2:2f:8b]
            modulus: e3f7fcc904c5132a86f61012e3350f74545daf814a6a8cf9d9dc810d4e54bff121b9b0ab409fc6dbeebb357265adb739545495b42e9bf039aa5b5a3e5148ce5785a6124ee4ba354f10a24371566844186005315fc5c8b6d6abd707d38048bdb27e186b8b96b77f57a57e8da1ea2b8f8c63a291bd12a36244e91ebf4d2c51704c76df96f8c4caf4cbe0a8885f84fb94ac7b71cf95ffac4dea0d6b2fdc3473acf15c8d5ca4707cf270009b816185640d51564e9201ec32e83d5b2d0c287fb322bb5b456add05605721bd9374cda13686d800aca1d368b3cf6cebe7a8bcddd78b86c462920e7835f973c8cc897ec380eadfba8b72ecb7b2dd5359579049231f0abd
    public exponent: 10001

] 
2022-06-09 07:16:55.454  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:16:55.456 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:16:55.459 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-09 07:16:55.461 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:16:55.462  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-09 07:16:55.467  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:16:55.467  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:16:55.468 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:16:55.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:16:55.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:16:55.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:16:55.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:16:55.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:16:55.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:16:55.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:16:55.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:16:55.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:16:55.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:16:55.665  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:16:55.665  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:16:55.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:16:55.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:16:55.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:16:55.667 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:16:55.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:16:55.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:16:55.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:16:55.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:16:55.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:16:55.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:16:55.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:a7:bc:69:ef:34:0f:b6:f6:83:7f:bb:0b:34:6d:e3:08:7c:a1:b3]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:18:53.030  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:18:53.045 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:18:53.063 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:18:53.065 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:18:53.065  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:18:53.081  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:18:53.082  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:18:53.082 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:18:53.083 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:18:53.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:18:53.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:18:53.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:18:53.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:18:53.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:18:53.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:18:53.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:18:53.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:18:53.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:18:53.296  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:18:53.298  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:18:53.298 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:18:53.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:18:53.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:18:53.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:18:53.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:18:53.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:18:53.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:18:53.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:18:53.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:18:53.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:18:53.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:af:5b:9f:cc:65:26:f1:47:11:04:e2:97:71:60:04:b7:49:eb:89]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:22:14.464  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:22:14.467 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:22:14.470 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:22:14.471 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:22:14.471  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:22:14.472  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:22:14.473  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:22:14.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:22:14.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:22:14.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:22:14.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:22:14.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:22:14.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:22:14.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:22:14.602  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:22:14.603  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:22:14.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:22:14.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:22:14.606  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:22:14.606  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:22:14.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:22:14.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:22:14.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:22:14.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:22:14.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:22:14.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:22:14.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:22:14.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:22:14.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:22:14.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:22:14.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:ea:cb:5f:48:e0:38:0c:36:0b:f4:f6:a3:e2:29:06:71:03:21:53]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:27:25.162  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:27:25.169 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:27:25.174 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:27:25.177 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:27:25.178  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:27:25.179  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:27:25.180  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:27:25.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:27:25.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:27:25.182 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:27:25.188 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:27:25.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:27:25.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:27:25.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:27:25.361  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:27:25.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:27:25.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:27:25.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:27:25.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:27:25.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:27:25.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:27:25.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:27:25.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:27:25.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:27:25.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:27:25.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:27:25.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:27:25.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:27:25.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:27:25.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:27:25.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:13:74:ab:e6:19:41:83:d6:33:26:54:db:05:a5:de:52:3f:7b:7c]
            modulus: edfbb7b6d0d10b9fb33c913dcbce6ce9d6ac1c36d8eb8e16b98c87346cd35c1c5539bae1cd86d3a46a9721322c40c1663ebb384e5324bb1f5dae2a60d6eb840ae3a225a81bf38accbb0d3991d250af959aec0c9f7ead775e0ed0f9a204b22cd30ae34d018e511a0709fdde33fd958a4bdc641fc05f43bceab01786e4db0a84c15ca5e8c8a55340d07cd9da5b7a4d03f913638e2721b4a98825b0920f4a1c37f1396efe48ff5a1c4e437422bb3ba2a8f5d7d083738125257f05817767b0a71086e91ee9ff8ad63e5e8de081e562df532eb1c74b896e0751370f64832d4cad6bd855262d6f1399632f72117aec57ffe3175d13a7a0126d245698bfd25093e9f617
    public exponent: 10001

] 
2022-06-09 07:30:43.362  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:30:43.364 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:30:43.366 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-09 07:30:43.368 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:30:43.369  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-09 07:30:43.370  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:30:43.370  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:30:43.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:30:43.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:30:43.372 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:30:43.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:30:43.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:30:43.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:30:43.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:30:43.551  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:30:43.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:30:43.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:30:43.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:30:43.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:30:43.556  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:30:43.556 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:30:43.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:30:43.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:30:43.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:30:43.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:30:43.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:30:43.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:30:43.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:30:43.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:30:43.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:30:43.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:ef:1d:c7:a9:c7:2e:5e:f6:a2:c0:31:1c:b1:eb:c0:99:66:f6:9d]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:31:42.810  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:31:42.828 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:31:42.831 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:31:42.837 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:31:42.837  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:31:42.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:31:42.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:31:42.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:31:42.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:31:42.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:31:42.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:31:42.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:31:42.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:31:42.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:31:43.036  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:31:43.038  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:31:43.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:31:43.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:31:43.043  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:31:43.043  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:31:43.045 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:31:43.045 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:31:43.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:31:43.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:31:43.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:31:43.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:31:43.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:31:43.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:31:43.052 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:31:43.054 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:31:43.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:35:5b:19:22:07:62:fa:e2:eb:76:39:ed:f8:15:eb:5d:b1:a0:ab]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:35:16.564  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:35:16.566 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:35:16.568 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:35:16.569 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:35:16.569  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:35:16.570  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:35:16.571  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:35:16.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:35:16.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:35:16.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:35:16.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:35:16.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:35:16.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:35:16.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:35:16.723  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:35:16.724  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:35:16.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:35:16.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:35:16.728  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:35:16.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:35:16.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:35:16.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:35:16.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:35:16.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:35:16.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:35:16.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:35:16.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:35:16.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:35:16.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:35:16.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:35:16.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:a6:87:e4:45:78:f4:80:9f:45:29:8e:53:00:e3:df:e6:b3:a5:fd]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:36:28.145  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:36:28.147 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:36:28.150 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-09 07:36:28.151 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:36:28.151  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-09 07:36:28.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:36:28.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:36:28.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:36:28.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:36:28.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:36:28.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:36:28.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:36:28.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:36:28.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:36:28.304  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:36:28.305  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:36:28.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:36:28.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:36:28.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:36:28.308  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:36:28.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:36:28.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:36:28.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:36:28.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:36:28.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:36:28.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:36:28.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:36:28.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:36:28.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:36:28.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:36:28.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:4f:4c:a5:b5:ab:e9:ad:8e:b5:ec:a0:3f:59:d6:fb:60:0c:42:9e]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:36:45.473  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:36:45.475 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:36:45.478 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-09 07:36:45.479 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:36:45.480  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-09 07:36:45.480  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:36:45.481  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:36:45.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:36:45.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:36:45.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:36:45.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:36:45.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:36:45.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:36:45.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:36:45.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:36:45.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:36:45.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:36:45.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:36:45.606  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:36:45.607  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:36:45.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:36:45.608 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:36:45.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:36:45.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:36:45.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:36:45.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:36:45.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:36:45.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:36:45.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:36:45.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:36:45.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:ed:1c:b7:26:46:ba:36:ad:42:94:cb:ae:3d:7d:c3:bc:3b:a2:e5]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:40:11.961  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:40:11.963 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:40:11.965 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:40:11.966 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:40:11.967  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:40:11.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:40:11.968  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:40:11.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:40:11.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:40:11.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:40:11.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:40:11.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:40:11.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:40:11.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:40:12.125  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:40:12.126  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:40:12.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:40:12.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:40:12.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:40:12.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:40:12.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:40:12.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:40:12.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:40:12.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:40:12.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:40:12.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:40:12.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:40:12.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:40:12.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:40:12.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:40:12.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:4e:c3:7e:83:ea:33:e4:80:f3:a0:79:4a:ce:15:16:00:8b:93:43]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:44:23.727  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:44:23.730 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:44:23.732 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:44:23.734 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:44:23.735  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:44:23.736  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:44:23.737  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:44:23.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:44:23.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:44:23.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:44:23.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:44:23.748 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:44:23.749 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:44:23.749 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:44:23.913  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:44:23.914  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:44:23.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:44:23.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:44:23.916  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:44:23.916  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:44:23.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:44:23.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:44:23.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:44:23.918 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:44:23.919 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:44:23.919 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:44:23.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:44:23.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:44:23.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:44:23.921 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:44:23.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:58:f3:41:7b:73:21:07:25:00:94:ef:64:e4:5e:d5:12:51:22:e6]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:48:42.258  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:48:42.260 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:48:42.262 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:48:42.262 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:48:42.263  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:48:42.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:48:42.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:48:42.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:48:42.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:48:42.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:48:42.273 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:48:42.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:48:42.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:48:42.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:48:42.413  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:48:42.415  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:48:42.415 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:48:42.416 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:48:42.417  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:48:42.418  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:48:42.419 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:48:42.419 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:48:42.420 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:48:42.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:48:42.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:48:42.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:48:42.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:48:42.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:48:42.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:48:42.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:48:42.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:8b:df:e9:3c:4f:66:a0:16:21:34:7d:4d:04:78:06:93:26:63:73]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:53:33.537  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:53:33.539 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:53:33.541 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:53:33.542 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:53:33.543  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:53:33.544  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:53:33.544  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:53:33.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:53:33.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:53:33.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:53:33.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:53:33.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:53:33.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:53:33.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:53:33.728  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:53:33.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:53:33.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:53:33.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:53:33.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:53:33.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:53:33.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:53:33.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:53:33.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:53:33.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:53:33.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:53:33.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:53:33.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:53:33.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:53:33.737 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:53:33.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:53:33.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:eb:aa:b4:19:30:63:cf:47:82:90:58:13:0a:a4:d8:dd:c9:a1:a4]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 07:57:58.805  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 07:57:58.808 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 07:57:58.811 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:57:58.812 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 07:57:58.813  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 07:57:58.813  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 07:57:58.814  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 07:57:58.814 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 07:57:58.815 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 07:57:58.815 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 07:57:58.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 07:57:58.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:57:58.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 07:57:58.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:57:58.991  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 07:57:58.994  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 07:57:58.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 07:57:58.995 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 07:57:58.998  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 07:57:58.998  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 07:57:58.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:57:58.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:57:58.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:57:59.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:57:59.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:57:59.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:57:59.002 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 07:57:59.002 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 07:57:59.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 07:57:59.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 07:57:59.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 581781882850127038551291336646352029639642980493
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 05:39:56 UTC 2022
           Final Date: Tue Jun 08 05:39:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:cd:5d:44:a9:82:05:b1:df:3c:f3:f7:d1:f9:93:7d:fb:25:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50611148a1b70ab4a0124452c0a70e4f32b003d7
                       1883ad0d540dbf8594cb95033605c46f558a51e9
                       6004105295fc0d970380e792a08c674fbbdbc135
                       3437abc452be7baa1c7da64a620956ab841b5879
                       c10a1274bb2970e55f926b907e475d85b74bb2c3
                       e25b431188e9468ec3ed0224e47880255cc926c8
                       bf6cd5b620fa06adaa8f43c62752375a5e4b5ee5
                       85647bc6c3f88a359f844ba46a52e865ceeb4d21
                       f7beb531ab63d7fad2a2c8b215c605152d71a373
                       c03b556e61b29713992b126c508426645e3d3653
                       5e311024ca36cc1d4bc0783c27e3b7e3ef2c2e16
                       e33b98a648d8ec9c43b2e0374dd883e9e2ea1ed9
                       8dc396a9fc3068235f332f622fa53e36f1a44713
                       ba15abc172c493c14b194de22da67153877ccfb4
                       57423c7dcc26d7dc65f3bed02b47200af7a7d911
                       536cf693554b88c4d31e50f5c7b59dab6d06083b
                       880988e92580a158a7390bbe127c281d34590245
                       5b715ac223b33c791941d13eaa9f8d7221e5e93c
                       bffcdee6a09900dae1f84b2bbf9bccbe5eb4169f
                       459aba36
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:eb:f4:7e:59:70:5a:33:c2:6a:32:f6:e4:15:b7:e2:dc:d4:72:1a]
            modulus: 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
    public exponent: 10001

]