Results

By type

          2022-06-26 05:41:08,209 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-26 05:41:11,002 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-26 05:41:12.619  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 26, 2022 5:41:17 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 26, 2022 5:41:17 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 26, 2022 5:41:17 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 26, 2022 5:41:17 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-26 05:41:18.800 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-26 05:41:19.425  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-26 05:41:19.848  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-26 05:41:21.475 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-26 05:41:21.482 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-26 05:41:21.485 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-26 05:41:21.492 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-26 05:41:21.579 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-26 05:41:21.588 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-26 05:41:21.846 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-26 05:41:22.922 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 26, 2022 5:41:24 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-26 05:41:25.170  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 18.677 seconds (JVM running for 22.368)
Jun 26, 2022 5:41:35 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-26 05:42:07.672  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:42:07.695 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:42:07.783 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-26 05:42:07.799 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:42:07.845  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-26 05:42:07.850  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:42:07.857  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:42:07.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:42:07.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:42:07.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:42:07.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:42:07.903 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:42:08.011 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:42:08.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:42:08.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:42:08.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:42:08.905  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:42:08.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:42:08.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:42:08.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:42:08.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:42:08.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:42:08.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:42:08.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:42:08.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:42:08.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:42:08.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:42:08.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:42:08.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:42:08.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:42:08.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:42:08.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:42:09.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:39:54:c7:2a:c8:44:5e:49:9c:3d:4c:c0:4a:28:55:41:9e:13:89]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:11:08.380  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:11:08.385 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:11:08.392 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:11:08.410 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:11:08.413  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:11:08.421  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:11:08.422  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:11:08.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:11:08.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:11:08.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:11:08.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:11:08.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:11:08.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:11:08.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:11:08.674  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:11:08.680  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:11:08.681 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:11:08.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:11:08.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:11:08.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:11:08.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:11:08.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:11:08.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:11:08.697 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:11:08.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:11:08.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:11:08.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:11:08.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:11:08.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:11:08.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:11:08.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:c9:40:80:a1:e9:e4:08:6c:a8:f8:ff:67:2f:e0:19:ed:c8:0d:26]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:12:58.202  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:12:58.211 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:12:58.221 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-26 07:12:58.224 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:12:58.225  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-26 07:12:58.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:12:58.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:12:58.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:12:58.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:12:58.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:12:58.269 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:12:58.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:12:58.272 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:12:58.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:12:58.445  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:12:58.446  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:12:58.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:12:58.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:12:58.463  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:12:58.466  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:12:58.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:12:58.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:12:58.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:12:58.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:12:58.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:12:58.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:12:58.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:12:58.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:12:58.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:12:58.483 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:12:58.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:89:b5:ac:25:45:1b:4a:d5:aa:f0:a8:34:c1:34:b8:b5:24:b2:12]
            modulus: bcce668e22d6ee5dec64cfddcfcfe3e0f6de8b14f748a87c65b276c677a37bc70778c54e1c0fc212410c260618804b6822c91fc9ba0922e6baf50054e94b0e7a0fb263290a715f8a293c561faf11a28029f53646ceba6d029d97aceab8e1ef932696e4cb33c6e58fdeae5200a8b04c66f850bf9e0df8df85d720850c3f39136285190f9b50adf704df08ced486aedea6e84a1b6d67b2f2d894bbd47c1e505c0d3718aade52b4e85c1dbfc97a29c86047213118868fe4962b623f3f9e69ae9c0eb5988d50f88775002c45014ed2925f27a8133ef7acaed8756bd817944349790a895774146818fff518ecb751da9fb13e98a581974fc97e760b17e821f660207d
    public exponent: 10001

] 
2022-06-26 07:14:22.200  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:14:22.203 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:14:22.205 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-26 07:14:22.211 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:14:22.213  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-26 07:14:22.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:14:22.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:14:22.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:14:22.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:14:22.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:14:22.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:14:22.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:14:22.239 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:14:22.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:14:22.429  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:14:22.430  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:14:22.431 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:14:22.431 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:14:22.434  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:14:22.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:14:22.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:14:22.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:14:22.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:14:22.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:14:22.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:14:22.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:14:22.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:14:22.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:14:22.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:14:22.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:14:22.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:cd:8a:fd:ae:41:d4:f4:dc:12:a0:c1:f5:85:31:8d:4c:f3:54:44]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:16:48.055  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:16:48.065 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:16:48.068 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:16:48.071 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:16:48.072  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:16:48.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:16:48.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:16:48.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:16:48.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:16:48.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:16:48.114 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:16:48.116 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:16:48.117 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:16:48.117 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:16:48.260  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:16:48.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:16:48.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:16:48.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:16:48.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:16:48.266  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:16:48.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:16:48.269 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:16:48.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:16:48.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:16:48.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:16:48.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:16:48.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:16:48.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:16:48.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:16:48.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:16:48.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:10:60:33:37:fe:ff:3e:88:78:7a:66:7e:6b:dd:49:17:fe:36:19]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:20:59.730  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:20:59.736 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:20:59.740 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:20:59.741 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:20:59.742  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:20:59.744  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:20:59.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:20:59.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:20:59.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:20:59.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:20:59.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:20:59.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:20:59.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:20:59.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:20:59.934  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:20:59.935  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:20:59.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:20:59.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:20:59.939  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:20:59.940  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:20:59.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:20:59.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:20:59.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:20:59.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:20:59.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:20:59.944 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:20:59.945 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:20:59.945 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:20:59.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:20:59.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:20:59.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:4d:c7:dd:63:e8:f2:6d:ec:a3:22:1e:26:79:c5:f1:02:61:ad:65]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:25:49.409  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:25:49.413 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:25:49.417 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:25:49.419 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:25:49.420  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:25:49.421  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:25:49.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:25:49.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:25:49.431 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:25:49.432 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:25:49.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:25:49.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:25:49.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:25:49.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:25:49.657  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:25:49.658  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:25:49.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:25:49.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:25:49.662  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:25:49.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:25:49.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:25:49.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:25:49.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:25:49.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:25:49.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:25:49.668 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:25:49.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:25:49.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:25:49.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:25:49.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:25:49.681 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:29:eb:97:90:b3:ac:2e:47:de:4a:5d:9e:e7:c5:fe:f2:6a:e4:ad]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:29:06.874  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:29:06.877 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:29:06.881 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-26 07:29:06.883 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:29:06.884  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-26 07:29:06.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:29:06.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:29:06.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:29:06.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:29:06.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:29:06.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:29:06.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:29:06.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:29:06.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:29:07.037  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:29:07.038  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:29:07.038 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:29:07.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:29:07.041  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:29:07.042  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:29:07.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:29:07.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:29:07.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:29:07.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:29:07.046 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:29:07.046 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:29:07.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:29:07.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:29:07.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:29:07.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:29:07.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:82:60:a6:83:a8:10:a5:ca:8b:94:5d:52:81:90:d0:0a:ea:1d:f4]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:30:22.380  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:30:22.383 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:30:22.393 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:30:22.396 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:30:22.396  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:30:22.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:30:22.399  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:30:22.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:30:22.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:30:22.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:30:22.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:30:22.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:30:22.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:30:22.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:30:22.662  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:30:22.663  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:30:22.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:30:22.664 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:30:22.667  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:30:22.668  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:30:22.683 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:30:22.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:30:22.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:30:22.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:30:22.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:30:22.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:30:22.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:30:22.691 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:30:22.691 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:30:22.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:30:22.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:1b:d6:c5:50:56:a6:06:87:a2:a2:12:bf:88:d4:4d:0e:fe:0e:b7]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:34:17.629  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:34:17.633 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:34:17.643 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-26 07:34:17.645 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:34:17.647  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-26 07:34:17.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:34:17.649  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:34:17.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:34:17.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:34:17.651 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:34:17.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:34:17.666 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:34:17.666 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:34:17.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:34:17.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:34:17.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:34:17.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:34:17.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:34:17.865  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:34:17.867  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:34:17.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:17.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:17.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:17.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:17.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:17.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:17.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:17.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:17.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:17.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:34:17.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:f3:86:a0:3c:34:5e:e5:9e:e8:9d:4a:4d:76:04:83:0e:18:5a:af]
            modulus: a5893d32adf4eb56c5cc2143e4599e2d9a0e3871a525e32d445d1f5d26ce4b1c29755184e33a8cfe06112ecadd10dedebcc5ccea5a175cbb88f150690cf22cc7fa31a9fa46bf6a5d7f6f59a74a8bcbc438934477f5b92f9b13a8dad10b702790db3b22b0c34d5cc5bf30bd892fe7b71894fd922f7e0769e39c80bc39596a8b2dd4ec13fb9ea0980ca243ca5ba8db077a82c7ecdd7716b7076c3e48718dcb9132613d90c5892e0daceb12bda4e8cb3ea072e8b972990dba003bf8c1b4ec56fb58f5a34ee822453b55d0ad49dd0e7759c19428f915ff522a2509c755f3ed19bcf7369bd0173d888a04fa2a987298be9faaa0a5dfdd83d5f361c9fac94ddf7f6c75
    public exponent: 10001

] 
2022-06-26 07:34:18.634  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:34:18.636 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:34:18.638 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:34:18.639 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:34:18.640  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:34:18.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:34:18.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:34:18.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:34:18.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:34:18.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:34:18.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:34:18.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:34:18.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:34:18.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:34:18.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:34:18.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:34:18.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:34:18.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:34:18.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:34:18.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:34:18.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:18.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:18.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:18.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:18.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:18.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:18.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:18.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:18.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:18.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:34:18.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:0a:32:a8:39:4b:66:90:d5:d8:51:d0:ec:68:b3:72:2c:d3:e3:a9]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:34:34.546  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:34:34.547 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:34:34.550 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-26 07:34:34.551 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:34:34.552  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-26 07:34:34.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:34:34.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:34:34.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:34:34.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:34:34.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:34:34.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:34:34.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:34:34.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:34:34.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:34:34.739  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:34:34.740  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:34:34.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:34:34.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:34:34.746  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:34:34.747  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:34:34.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:34.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:34.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:34.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:34.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:34.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:34.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:34:34.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:34:34.755 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:34:34.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:34:34.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: e9e5fc935979d2947a60a1c5bf042a589c11419a6376fe3cf223f1f33c7f6379d7f6aeaa7dd24f11c14ca3713dfff1e9bec25a4b3bba46afabbf4b6d74bab177c2a916eecc1dc0633af8076dcddf31120ecdfbc9c9e1bbeae6c603621b736c88457d3cd4f6419f1b47d202898024cd955bf306ab00a7f5ea4513fd75e34d4b8ed35383ccbac79da9eda9675ea8babce1df5d900a5b7e9a53a9a1ba6553dc6ebbb8feb82d0453d0830320e9bd5731b0df3fab176525f85dfaac8a4c435fead28b88e3a7132685a16334afa28927eeed749b1f97f4b3776c3b84a4068e01dfc23ad94034b74d5587898797eae0eeeca88edeed21b99079c6443cb70dddf387a0a3748a6540a08344f8c124e059a46ba9684a5e387c9c4392f04ebef28d42b1bc147fad9c4becc1cf53d4a3a4c6e5cb14cb6bb3955507a4de2f3f56251a12f0c5f42ef817d270fca706c734ac032eb3c8957ae25500bf5a15c12121fa6bc383a84329f0becf9c5a487a95208747960f79faf6dced820882c6aa54705cbbeb6b37f3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:a9:1b:c8:94:db:38:3f:31:d3:e4:30:e3:ae:43:cb:dc:1e:9f:a2]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:38:24.979  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:38:24.982 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:38:24.985 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:38:24.986 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:38:24.987  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:38:24.988  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:38:24.988  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:38:24.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:38:24.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:38:24.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:38:25.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:38:25.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:38:25.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:38:25.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:38:25.183  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:38:25.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:38:25.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:38:25.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:38:25.187  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:38:25.189  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:38:25.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:38:25.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:38:25.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:38:25.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:38:25.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:38:25.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:38:25.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:38:25.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:38:25.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:38:25.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:38:25.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:11:11:a6:bf:ec:79:66:4d:e8:0e:d8:47:89:b0:aa:96:95:50:67]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:43:05.844  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:43:05.849 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:43:05.853 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:43:05.856 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:43:05.857  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:43:05.858  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:43:05.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:43:05.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:43:05.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:43:05.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:43:05.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:43:05.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:43:05.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:43:05.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:43:06.032  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:43:06.033  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:43:06.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:43:06.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:43:06.036  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:43:06.037  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:43:06.038 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:43:06.038 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:43:06.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:43:06.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:43:06.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:43:06.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:43:06.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:43:06.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:43:06.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:43:06.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:43:06.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:89:b8:10:e1:f6:bb:e3:44:39:86:22:6e:7c:ee:b6:e0:34:2a:7c]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:47:44.629  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:47:44.634 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:47:44.640 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:47:44.645 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:47:44.648  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:47:44.649  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:47:44.650  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:47:44.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:47:44.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:47:44.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:47:44.679 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:47:44.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:47:44.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:47:44.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:47:44.825  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:47:44.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:47:44.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:47:44.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:47:44.829  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:47:44.829  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:47:44.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:47:44.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:47:44.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:47:44.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:47:44.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:47:44.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:47:44.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:47:44.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:47:44.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:47:44.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:47:44.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:36:b3:c5:e3:71:3b:0f:f8:fd:93:a7:5a:03:b8:f8:54:68:1a:ee]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 07:52:48.768  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:52:48.772 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:52:48.778 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:52:48.790 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:52:48.791  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:52:48.792  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:52:48.799  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:52:48.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:52:48.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:52:48.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:52:48.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:52:48.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:52:48.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:52:48.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:52:49.080  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:52:49.081  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:52:49.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:52:49.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:52:49.085  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:52:49.085  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:52:49.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:52:49.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:52:49.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:52:49.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:52:49.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:52:49.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:52:49.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:52:49.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:52:49.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:52:49.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:52:49.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:92:ed:68:e9:68:b1:a0:0b:fe:44:c5:9c:7e:99:4c:f9:c6:54:db]
            modulus: a0468db5569966e83a40cb810e8c6131db048930888be10b40d497d9da2670ef5361a05779b653bea1e725bd6da638bca2ac9ab131d522b7f3c7fa5220a51ccefb5bb4ca479a64f7d555a938ce0bb084545dcd4e176cac5f62abb5314314052c775907e178b0084192792c7f6e09dcd9742ee684e6606b375a57c44f21902611701bd25a79920a6be450049cc593a9f26df73387df39104eec080dfbe84e04192e3ff840ad096fb17cd226ca4b0f77f6ec1799d81697180c5fc6dfc372ec7e461d5e9670ca3b076b83732f3a68ca9f10a203fa10bba88fb59f9db6d1abbc4c94a594ffec50b6f00cfb79f956e30aed4582fcb20a330c8b6b7fffa7f52563c90b
    public exponent: 10001

] 
2022-06-26 07:57:24.674  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 07:57:24.695 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 07:57:24.705 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:57:24.708 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 07:57:24.712  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 07:57:24.713  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 07:57:24.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 07:57:24.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 07:57:24.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 07:57:24.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 07:57:24.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 07:57:24.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:57:24.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 07:57:24.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:57:24.904  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 07:57:24.907  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 07:57:24.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 07:57:24.908 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 07:57:24.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 07:57:24.911  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 07:57:24.911 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:57:24.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:57:24.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:57:24.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:57:24.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:57:24.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:57:24.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 07:57:24.920 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 07:57:24.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 07:57:24.922 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 07:57:24.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662879038550206087812256018332818632566666748787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 05:38:53 UTC 2022
           Final Date: Fri Jun 25 05:38:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d6:bb:d4:20:f8:9b:66:57:41:1a:20:c9:df:84:bd:e1:b8:43:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 36bbf92ae3b8c9dbf5e1b411bdad6528e2db0763
                       56ef7c2df90aec5967d88f4cc4a0d658a6cf6598
                       d88f2076b84ee18e961ba31b8ec39d99b7caf575
                       d0b01904b0e8f76c59c93b6395757adafeb2e341
                       82129e0e0caaf853edceabc60b4e3ad262d225d5
                       249196e90f76cd8cf07066f95154be29fddfb7da
                       436fabb1781fc13db96da9307b62b1eaa8426d2a
                       4a518319d3c24ad5c7e4d33d4b9458761611e0f0
                       7dfc60d9d0668892b8fbf115d6d6dffceaee3634
                       9a33fbcf5fd4b0127343ef39da6e218cf051414c
                       97d6900dc094ac7419dadb017a3cc18075efdee9
                       8ae0e58b10883456a2df04d81ecbe3d24a97164f
                       52f0b8caea9b01c5e8db72182baf35490ef756ce
                       5b3e48a85544af197f7de862a1bb56ea2132d1ae
                       aee52c38649b22a92873dc038494d1cfbe085962
                       f4723899495ab4b4b749c8954b1d2ae7665138f4
                       be2a100a82492e4dc554fe963caafba2c350555a
                       5c434ac95aeb04d676f3fae08cb39e26a977c0b4
                       8cdc815dcce72c6e454c6576df066689d6f93532
                       afc4d88e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:e9:b3:b8:f8:18:79:c8:3a:a8:fa:2f:05:7e:a3:15:31:b1:d9:09]
            modulus: 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
    public exponent: 10001

]