Results

By type

          2022-08-25 05:04:03,020 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-25 05:04:04,417 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-25 05:04:05.336  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 25, 2022 5:04:08 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 25, 2022 5:04:08 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 25, 2022 5:04:08 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 25, 2022 5:04:08 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-25 05:04:09.278 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-25 05:04:09.709  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-25 05:04:09.900  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-25 05:04:11.537 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-25 05:04:11.541 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-08-25 05:04:11.542 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-25 05:04:11.546 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-25 05:04:11.592 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-08-25 05:04:11.598 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-08-25 05:04:11.812 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-25 05:04:12.642 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 25, 2022 5:04:13 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-25 05:04:14.155  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.266 seconds (JVM running for 15.397)
Aug 25, 2022 5:04:34 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-25 05:06:17.447  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 05:06:17.462 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 05:06:17.526 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-25 05:06:17.544 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 05:06:17.574  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-25 05:06:17.582  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 05:06:17.584  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 05:06:17.592 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 05:06:17.593 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 05:06:17.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 05:06:17.612 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 05:06:17.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 05:06:17.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 05:06:17.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 05:06:17.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 05:06:17.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 05:06:18.457  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 05:06:18.460  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 05:06:18.461 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 05:06:18.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 05:06:18.479  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 05:06:18.481  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 05:06:18.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 05:06:18.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 05:06:18.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 05:06:18.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 05:06:18.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 05:06:18.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 05:06:18.508 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 05:06:18.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 05:06:18.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 05:06:18.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 05:06:18.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:6d:e3:1e:f3:8e:78:23:46:42:80:c4:21:fc:94:e6:5f:fa:10:5b]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:10:55.054  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:10:55.063 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:10:55.066 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:10:55.077 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:10:55.078  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:10:55.084  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:10:55.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:10:55.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:10:55.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:10:55.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:10:55.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:10:55.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:10:55.127 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:10:55.127 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:10:55.398  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:10:55.399  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:10:55.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:10:55.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:10:55.405  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:10:55.406  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:10:55.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:10:55.408 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:10:55.410 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:10:55.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:10:55.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:10:55.415 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:10:55.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:10:55.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:10:55.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:10:55.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:10:55.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:a3:56:c1:77:ce:cf:13:97:d1:12:90:7f:04:ad:d0:ed:53:3f:7e]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:12:58.014  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:12:58.016 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:12:58.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-25 07:12:58.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:12:58.019  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-25 07:12:58.020  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:12:58.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:12:58.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:12:58.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:12:58.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:12:58.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:12:58.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:12:58.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:12:58.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:12:58.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:12:58.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:12:58.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:12:58.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:12:58.293  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:12:58.295  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:12:58.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:12:58.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:12:58.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:12:58.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:12:58.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:12:58.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:12:58.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:12:58.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:12:58.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:12:58.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:12:58.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:61:2c:e4:08:e2:3c:ae:8a:72:d5:6e:57:0c:63:4b:4e:63:11:e6]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:14:25.029  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:14:25.030 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:14:25.032 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-25 07:14:25.033 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:14:25.034  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-25 07:14:25.035  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:14:25.036  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:14:25.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:14:25.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:14:25.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:14:25.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:14:25.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:14:25.048 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:14:25.048 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:14:25.322  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:14:25.324  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:14:25.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:14:25.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:14:25.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:14:25.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:14:25.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:14:25.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:14:25.332 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:14:25.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:14:25.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:14:25.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:14:25.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:14:25.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:14:25.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:14:25.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:14:25.342 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:63:2e:93:e8:42:4e:01:f5:0b:aa:3b:4c:57:22:b2:fc:f0:c9:6f]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:16:30.790  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:16:30.792 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:16:30.795 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:16:30.797 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:16:30.797  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:16:30.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:16:30.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:16:30.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:16:30.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:16:30.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:16:30.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:16:30.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:16:30.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:16:30.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:16:30.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:16:30.965  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:16:30.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:16:30.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:16:30.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:16:30.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:16:30.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:16:30.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:16:30.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:16:30.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:16:30.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:16:30.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:16:30.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:16:30.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:16:30.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:16:30.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:16:30.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 9acda78a5d7e8151676721186b0ac058601ece0a7587e618df41cc96a8ff7f4c416576d4cda9c8b0dd4792469db67018438a9a26ab3f4a98ff9f424d8bbbcd9ff3a833aa5ec888e9e398d1e7de88b278fe094088dad01594f78529cd1c09e90d0715e68a7d5ab86b0f57aea5f21bf4b5f472bf8f397a29345de41f017ee375c8c4a1f2ae7524386d6ba5e657885871f14788e172aff4d0ef2c9d9be727b19fdff513c8f61d9a6cf23208459ca7eec246c04896eb60a1cb82576fc39e8c815eba9024aff2c811c515f9ad10bc94aee11527acfa53cee30ad4f817af39f47b3997433eeef24af29f38c360a1854224f88e90d70aee503406f2face4fe84d1064a82dbcbf9736b2c4d3ac14213cadbb588d6fcf72ea299e0f00e5fe53929b861f70a9079a7d749a1884618ca87836328fd923a0d94ac908f111640cc138c60885b9aca39990783665f4b7a16c7f477222441e5d124f41b5bd50c5b666896b84882989ec64fde94f00b2461e56af4d6960c054b3ac0163ed5118d3a5af51d51fe385
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:e7:6b:fe:d3:85:d2:bd:eb:ab:ed:96:6a:93:ad:ae:df:06:51:d8]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:20:06.157  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:20:06.159 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:20:06.164 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:20:06.166 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:20:06.166  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:20:06.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:20:06.168  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:20:06.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:20:06.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:20:06.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:20:06.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:20:06.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:20:06.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:20:06.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:20:06.319  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:20:06.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:20:06.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:20:06.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:20:06.322  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:20:06.323  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:20:06.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:20:06.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:20:06.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:20:06.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:20:06.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:20:06.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:20:06.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:20:06.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:20:06.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:20:06.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:20:06.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:27:1d:f7:96:89:ac:fd:fa:38:64:e7:72:da:e1:62:01:06:6e:d2]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:24:19.118  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:24:19.120 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:24:19.122 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:24:19.123 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:24:19.124  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:24:19.125  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:24:19.125  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:24:19.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:24:19.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:24:19.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:24:19.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:24:19.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:24:19.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:24:19.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:24:19.313  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:24:19.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:24:19.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:24:19.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:24:19.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:24:19.317  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:24:19.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:24:19.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:24:19.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:24:19.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:24:19.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:24:19.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:24:19.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:24:19.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:24:19.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:24:19.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:24:19.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:fb:53:34:98:a0:06:45:ce:12:55:ea:d3:16:75:70:12:50:ef:6a]
            modulus: ef6d3361103431e3cd3293ec6e021b95b1ce67ffe59b956143d8ddaef4e2bd1ad71dcc8b06584c489fbd1b298f03d72ef3a20b79738f20cc3fa60bfff8adfc6b61f1f6013315281e4e9a9b78ba7b1877c18ea1e43e311431479b201e242b13b7b262bf1b0fb1a03294f3afe36d0361af32b737e2c6c30af3227c61de23cbdcd62922f3773ec3eabcef5d5492831e3228649c7605bdcb8f71ae5098a66bce8a4a32a966604654f3bed3efee8b3f1de65f4f51db9db5bc7e5a39d42c9fd60c64e50ae19160a4e4a13173e8b57f65ad0952dabb1c66bb60add651cd208ccffaf59dbf58e5adfda625637729c43b32289078148af3b73243b2a4b43eb9d94e695b75
    public exponent: 10001

] 
2022-08-25 07:28:01.747  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:28:01.748 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:28:01.750 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:28:01.751 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:28:01.751  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:28:01.753  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:28:01.753  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:28:01.754 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:28:01.754 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:28:01.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:28:01.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:28:01.764 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:28:01.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:28:01.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:28:01.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:28:01.940  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:28:01.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:28:01.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:28:01.942  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:28:01.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:28:01.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:28:01.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:28:01.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:28:01.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:28:01.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:28:01.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:28:01.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:28:01.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:28:01.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:28:01.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:28:01.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 9acda78a5d7e8151676721186b0ac058601ece0a7587e618df41cc96a8ff7f4c416576d4cda9c8b0dd4792469db67018438a9a26ab3f4a98ff9f424d8bbbcd9ff3a833aa5ec888e9e398d1e7de88b278fe094088dad01594f78529cd1c09e90d0715e68a7d5ab86b0f57aea5f21bf4b5f472bf8f397a29345de41f017ee375c8c4a1f2ae7524386d6ba5e657885871f14788e172aff4d0ef2c9d9be727b19fdff513c8f61d9a6cf23208459ca7eec246c04896eb60a1cb82576fc39e8c815eba9024aff2c811c515f9ad10bc94aee11527acfa53cee30ad4f817af39f47b3997433eeef24af29f38c360a1854224f88e90d70aee503406f2face4fe84d1064a82dbcbf9736b2c4d3ac14213cadbb588d6fcf72ea299e0f00e5fe53929b861f70a9079a7d749a1884618ca87836328fd923a0d94ac908f111640cc138c60885b9aca39990783665f4b7a16c7f477222441e5d124f41b5bd50c5b666896b84882989ec64fde94f00b2461e56af4d6960c054b3ac0163ed5118d3a5af51d51fe385
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:34:8e:f8:ea:3f:b3:e0:1f:1e:3c:b0:dd:7a:1f:4a:04:eb:5f:b4]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:32:02.143  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:32:02.146 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:32:02.150 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:32:02.152 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:32:02.152  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:32:02.153  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:32:02.153  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:32:02.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:32:02.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:32:02.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:32:02.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:32:02.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:32:02.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:32:02.166 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:32:02.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:32:02.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:32:02.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:32:02.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:32:02.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:32:02.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:32:02.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:32:02.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:32:02.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:32:02.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:32:02.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:32:02.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:32:02.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:32:02.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:32:02.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:32:02.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:32:02.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:d2:06:f5:87:d8:40:4f:39:ce:2f:a0:38:b3:9a:ba:d9:47:c0:c5]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:36:25.805  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:36:25.807 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:36:25.809 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:36:25.809 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:36:25.810  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:36:25.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:36:25.813  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:36:25.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:36:25.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:36:25.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:36:25.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:36:25.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:36:25.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:36:25.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:36:25.961  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:36:25.961  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:36:25.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:36:25.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:36:25.965  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:36:25.966  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:36:25.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:36:25.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:36:25.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:36:25.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:36:25.969 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:36:25.969 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:36:25.970 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:36:25.970 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:36:25.971 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:36:25.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:36:25.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:75:5e:88:63:63:35:6e:f3:2c:f0:39:55:8a:1d:a5:0c:11:61:34]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:40:32.862  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:40:32.864 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:40:32.866 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:40:32.867 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:40:32.868  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:40:32.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:40:32.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:40:32.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:40:32.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:40:32.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:40:32.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:40:32.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:40:32.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:40:32.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:40:33.025  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:40:33.028  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:40:33.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:40:33.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:40:33.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:40:33.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:40:33.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:40:33.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:40:33.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:40:33.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:40:33.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:40:33.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:40:33.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:40:33.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:40:33.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:40:33.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:40:33.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:8d:23:45:29:01:ed:2f:af:fa:6e:a8:60:36:95:f5:42:ad:11:ea]
            modulus: d1e91c62167e67f228511f99941830c283662d0b80c9a825a5fcea54c99ed5e547c3388294a641a52a08a7b43014ae91dfa47c7c2a034875eccd00bafc3972a6cdfec1c9d8cb9f3bc989c8c2ce26e6ed5794266928f1bf86c3ede05f6abea98e6aa0f3f5556aaaf5f5e5cadfd741ccca80ffad25f51f31696b4a2bd30f5b0896f921e3e58dc6ef3f14df7a99969e11cca318b28d31cba2ec1a0c8c3727dda42c4e55c7fb023cda64964f7b1565960bef31706ea9e418cf546e411fe92ac0ffa28807b4f6c4683bd5fb3c1622573796dfd12d60eaba4892148e5fddff5be039b12a69fe6d7df747ee0425c0a7c9665f6929c1d8a50d0b5d87f29582b1ce5d8f7d
    public exponent: 10001

] 
2022-08-25 07:44:48.036  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:44:48.041 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:44:48.043 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:44:48.045 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:44:48.045  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:44:48.046  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:44:48.046  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:44:48.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:44:48.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:44:48.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:44:48.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:44:48.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:44:48.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:44:48.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:44:48.239  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:44:48.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:44:48.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:44:48.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:44:48.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:44:48.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:44:48.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:44:48.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:44:48.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:44:48.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:44:48.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:44:48.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:44:48.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:44:48.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:44:48.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:44:48.249 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:44:48.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:c4:36:21:38:e6:e2:ec:88:3f:ee:83:ee:8a:cd:e5:23:d0:d0:b3]
            modulus: 9d2f8e28a9e48a6911215f6dd9f4265f68bc3953cd6788185a47c5dd125682f306b2202f05df44b2d6d445313194ac42f79ffad25d7ab7c6b4f17f9795cbc966e6145ccac69005a3f18e4f21a8ef0b2dda2d4a7077ac7e80893a2d6b3a4afb2ec9684ebfab54bdb42e09b6ff5031323d731f864cf675ab8cf537aa0f8cc88891e492b76f92a96513f0f3675739593e1101aee03547f7a58281c6f6b5e57d13d02b6039a0fd229aa25547b4b6261abe4dbf58bdaac913b198cec0eb45d4a5d3876245de1d6ddfbc315a9f4f090cc58d6cc11db8f7c94c683450eeb5076abb5c9aa6017c8803327dcfe2c0c9249a9770610c3e4eaea32689baeb1c4c04725460bf
    public exponent: 10001

] 
2022-08-25 07:49:03.663  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:49:03.673 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:49:03.684 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:49:03.686 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:49:03.686  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:49:03.687  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:49:03.688  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:49:03.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:49:03.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:49:03.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:49:03.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:49:03.698 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:49:03.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:49:03.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:49:03.830  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:49:03.831  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:49:03.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:49:03.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:49:03.835  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:49:03.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:49:03.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:49:03.837 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:49:03.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:49:03.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:49:03.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:49:03.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:49:03.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:49:03.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:49:03.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:49:03.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:49:03.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:a8:f5:dc:da:17:e7:c1:7e:94:cb:3d:19:28:a7:e9:e0:e2:1a:54]
            modulus: b19ff795fcece13a74370a6611c3e6ea6c5ef0d0b8eab99ec8a5f8357f8d65489c5063e0e108cb5f7752c5d6cd70baa771c97432dc24c65193973a1a3db1708d827c8f8d15d3edbca69b504c40c374076d62c95b005fffcc5570591c55cf8ed73ed69fed4e86d410a1f42fe313f3c876b666c30f210989d92e8d01d89dce46aace18fc9ffba2380239314d122bcbb16f4fc85b181994b8e196aa2204e6e3e0d89a38b6f298cd242a53cdde8e5c8c8af137261a48cfe43aaf6dc1d284e9840784feb3a18008a1906aedfc25feb2a55c05e5b90a7a8e79a92e21b6ee9f96b23e2af92a096064e7e043531f9136399602c1930b46e87c2074986f425e1a127f6cb9
    public exponent: 10001

] 
2022-08-25 07:53:56.710  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:53:56.713 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:53:56.717 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:53:56.718 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:53:56.719  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:53:56.720  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:53:56.721  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:53:56.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:53:56.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:53:56.723 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:53:56.729 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:53:56.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:53:56.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:53:56.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:53:56.931  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:53:56.932  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:53:56.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:53:56.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:53:56.935  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:53:56.936  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:53:56.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:53:56.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:53:56.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:53:56.940 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:53:56.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:53:56.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:53:56.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:53:56.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:53:56.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:53:56.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:53:56.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 9acda78a5d7e8151676721186b0ac058601ece0a7587e618df41cc96a8ff7f4c416576d4cda9c8b0dd4792469db67018438a9a26ab3f4a98ff9f424d8bbbcd9ff3a833aa5ec888e9e398d1e7de88b278fe094088dad01594f78529cd1c09e90d0715e68a7d5ab86b0f57aea5f21bf4b5f472bf8f397a29345de41f017ee375c8c4a1f2ae7524386d6ba5e657885871f14788e172aff4d0ef2c9d9be727b19fdff513c8f61d9a6cf23208459ca7eec246c04896eb60a1cb82576fc39e8c815eba9024aff2c811c515f9ad10bc94aee11527acfa53cee30ad4f817af39f47b3997433eeef24af29f38c360a1854224f88e90d70aee503406f2face4fe84d1064a82dbcbf9736b2c4d3ac14213cadbb588d6fcf72ea299e0f00e5fe53929b861f70a9079a7d749a1884618ca87836328fd923a0d94ac908f111640cc138c60885b9aca39990783665f4b7a16c7f477222441e5d124f41b5bd50c5b666896b84882989ec64fde94f00b2461e56af4d6960c054b3ac0163ed5118d3a5af51d51fe385
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:f8:01:17:0a:17:bf:05:cb:a6:b6:b8:b1:1d:9b:97:3f:44:ec:2e]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 07:58:12.483  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 07:58:12.485 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 07:58:12.487 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:58:12.488 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 07:58:12.488  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 07:58:12.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 07:58:12.499  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 07:58:12.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 07:58:12.501 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 07:58:12.501 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 07:58:12.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 07:58:12.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:58:12.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 07:58:12.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:58:12.673  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 07:58:12.678  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 07:58:12.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 07:58:12.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 07:58:12.682  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 07:58:12.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 07:58:12.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:58:12.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:58:12.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:58:12.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:58:12.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:58:12.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:58:12.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 07:58:12.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 07:58:12.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 07:58:12.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 07:58:12.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 9acda78a5d7e8151676721186b0ac058601ece0a7587e618df41cc96a8ff7f4c416576d4cda9c8b0dd4792469db67018438a9a26ab3f4a98ff9f424d8bbbcd9ff3a833aa5ec888e9e398d1e7de88b278fe094088dad01594f78529cd1c09e90d0715e68a7d5ab86b0f57aea5f21bf4b5f472bf8f397a29345de41f017ee375c8c4a1f2ae7524386d6ba5e657885871f14788e172aff4d0ef2c9d9be727b19fdff513c8f61d9a6cf23208459ca7eec246c04896eb60a1cb82576fc39e8c815eba9024aff2c811c515f9ad10bc94aee11527acfa53cee30ad4f817af39f47b3997433eeef24af29f38c360a1854224f88e90d70aee503406f2face4fe84d1064a82dbcbf9736b2c4d3ac14213cadbb588d6fcf72ea299e0f00e5fe53929b861f70a9079a7d749a1884618ca87836328fd923a0d94ac908f111640cc138c60885b9aca39990783665f4b7a16c7f477222441e5d124f41b5bd50c5b666896b84882989ec64fde94f00b2461e56af4d6960c054b3ac0163ed5118d3a5af51d51fe385
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:8e:55:10:be:91:2f:40:da:3b:70:aa:a4:87:d5:23:35:9c:7a:2a]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 08:07:09.938  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:07:09.944 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:07:09.946 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 08:07:09.948 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:07:09.949  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 08:07:09.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:07:09.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:07:09.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:07:09.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:07:09.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:07:09.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:07:09.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:07:09.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:07:09.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:07:10.254  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:07:10.255  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:07:10.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:07:10.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:07:10.257  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:07:10.257  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:07:10.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:07:10.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:07:10.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:07:10.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:07:10.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:07:10.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:07:10.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:07:10.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:07:10.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:07:10.262 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:07:10.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:13:f7:f4:60:e5:db:e0:1b:8f:90:c3:75:ce:c6:49:9c:1e:5b:08]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 08:11:27.867  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:11:27.870 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:11:27.872 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 08:11:27.874 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:11:27.874  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-25 08:11:27.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:11:27.876  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:11:27.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:11:27.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:11:27.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:11:27.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:11:27.889 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:11:27.889 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:11:27.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:11:28.084  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:11:28.085  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:11:28.085 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:11:28.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:11:28.088  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:11:28.089  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:11:28.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:11:28.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:11:28.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:11:28.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:11:28.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:11:28.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:11:28.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:11:28.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:11:28.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:11:28.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:11:28.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:52:9b:8e:90:65:c0:04:eb:ba:b0:8d:f9:8d:30:a0:6e:1d:a2:94]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 08:12:58.710  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:12:58.711 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:12:58.713 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-25 08:12:58.714 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:12:58.715  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-25 08:12:58.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:12:58.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:12:58.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:12:58.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:12:58.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:12:58.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:12:58.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:12:58.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:12:58.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:12:58.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:12:58.948  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:12:58.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:12:58.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:12:58.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:12:58.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:12:58.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:12:58.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:12:58.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:12:58.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:12:58.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:12:58.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:12:58.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:12:58.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:12:58.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:12:58.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:12:58.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:a6:27:3e:39:b7:c5:f5:a0:ce:1b:e5:a4:40:97:96:2d:34:4a:bd]
            modulus: a5bcc0aaeb65466e82678637432fd18da82719a6f29b192a804ef80649957218518c00202b51cb95684e45d4c5f93892ff2174a1de52af175e96ce2ff9ca20c2a52a081b19cbb49a88fcebce08460ea28d378f27d2e84c9244032e174d20e75152dc74060320685c597b596dfe378abfc20e5644cc7a5c72eb33490f87a9fd94599671daf30246c847b1b664686d72993e6a5b4d770d2f6e5166ef308999b2f25df4cf38159e8045e4883d808c61bf27dbb9ad4e9efeb251ebe7eed22654f136d58ba8f1364da5bd77f79d5de6ffdb474acdcb57ee82923e24f1e80dd9a9ef25ce414a428d8bdbc61422f14d4cbd409984b63323b607954efec9cfff2d518f17
    public exponent: 10001

] 
2022-08-25 08:18:36.147  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:18:36.150 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:18:36.152 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-25 08:18:36.153 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:18:36.154  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-25 08:18:36.155  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:18:36.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:18:36.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:18:36.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:18:36.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:18:36.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:18:36.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:18:36.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:18:36.170 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:18:36.333  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:18:36.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:18:36.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:18:36.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:18:36.336  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:18:36.336  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:18:36.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:18:36.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:18:36.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:18:36.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:18:36.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:18:36.341 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:18:36.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:18:36.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:18:36.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:18:36.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:18:36.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:d8:14:20:f7:a6:10:0b:9d:5e:d1:2a:84:fc:18:eb:b8:99:bf:ce]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 08:19:00.387  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:19:00.388 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:19:00.391 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-25 08:19:00.391 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:19:00.392  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-25 08:19:00.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:19:00.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:19:00.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:19:00.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:19:00.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:19:00.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:19:00.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:19:00.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:19:00.402 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:19:00.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:19:00.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:19:00.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:19:00.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:19:00.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:19:00.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:19:00.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:19:00.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:19:00.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:19:00.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:19:00.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:19:00.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:19:00.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:19:00.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:19:00.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:19:00.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:19:00.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 9acda78a5d7e8151676721186b0ac058601ece0a7587e618df41cc96a8ff7f4c416576d4cda9c8b0dd4792469db67018438a9a26ab3f4a98ff9f424d8bbbcd9ff3a833aa5ec888e9e398d1e7de88b278fe094088dad01594f78529cd1c09e90d0715e68a7d5ab86b0f57aea5f21bf4b5f472bf8f397a29345de41f017ee375c8c4a1f2ae7524386d6ba5e657885871f14788e172aff4d0ef2c9d9be727b19fdff513c8f61d9a6cf23208459ca7eec246c04896eb60a1cb82576fc39e8c815eba9024aff2c811c515f9ad10bc94aee11527acfa53cee30ad4f817af39f47b3997433eeef24af29f38c360a1854224f88e90d70aee503406f2face4fe84d1064a82dbcbf9736b2c4d3ac14213cadbb588d6fcf72ea299e0f00e5fe53929b861f70a9079a7d749a1884618ca87836328fd923a0d94ac908f111640cc138c60885b9aca39990783665f4b7a16c7f477222441e5d124f41b5bd50c5b666896b84882989ec64fde94f00b2461e56af4d6960c054b3ac0163ed5118d3a5af51d51fe385
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:c5:d0:cb:57:49:ac:6a:ce:d5:ca:63:7d:cf:98:9a:51:43:93:35]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 08:41:02.103  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:41:02.107 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:41:02.112 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-25 08:41:02.113 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:41:02.114  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-25 08:41:02.114  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:41:02.115  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:41:02.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:41:02.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:41:02.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:41:02.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:41:02.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:41:02.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:41:02.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:41:02.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:41:02.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:41:02.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:41:02.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:41:02.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:41:02.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:41:02.324 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:41:02.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:41:02.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:41:02.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:41:02.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:41:02.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:41:02.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:41:02.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:41:02.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:41:02.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:41:02.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:9f:41:91:c8:df:40:fa:02:82:3a:97:a0:85:16:22:93:74:9b:ba]
            modulus: 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
    public exponent: 10001

] 
2022-08-25 08:41:11.615  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-25 08:41:11.616 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-25 08:41:11.622 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-25 08:41:11.623 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-25 08:41:11.624  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-25 08:41:11.624  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-25 08:41:11.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-25 08:41:11.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-25 08:41:11.626 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-25 08:41:11.626 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-25 08:41:11.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-25 08:41:11.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:41:11.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-25 08:41:11.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:41:11.774  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-25 08:41:11.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-25 08:41:11.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-25 08:41:11.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-25 08:41:11.777  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-25 08:41:11.777  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-25 08:41:11.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:41:11.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:41:11.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:41:11.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:41:11.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:41:11.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:41:11.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-25 08:41:11.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-25 08:41:11.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-25 08:41:11.781 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-25 08:41:11.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 212184371249561710711687819097793125544133044883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 25 05:01:04 UTC 2022
           Final Date: Tue Aug 24 05:01:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:2b:fe:51:a7:85:c9:e6:c3:b4:d4:94:48:4b:54:11:92:3a:cd:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 999cbeb594a3532ea60ecf31613a22910ce3dbee
                       d7e69e33ca51f153c98812396e1545d3f1d2a755
                       fed56cf0c63ab7dbd04ce953e9d38ebefc54ffa6
                       d3d335ea4bc68e6c08970515e9a899402baa9067
                       3aed53897c306d1add764d29084f5b499ba529fe
                       207b750bff3fd13d8f7ab4a411b1f084fcc6cac0
                       9a041f64f2ca6dff07736afdc2ad4817b5886ab3
                       12c1ae884470981b0b59d7398f6b839b1b06a95e
                       ae200e040304c3be7bcabd908d8235bf7c64009a
                       8019b6755a2395f5b393dbe803df7085ae58b503
                       81d5a050c6a5473b94bba91af0994b2ded5e29e2
                       d247ee16d4675092dc79be896d9fd8f98aae431e
                       90ac4a9ac7dd50ed5dce5c0d73ddc98bfa7f3b7a
                       e724daab3d23320cfd49497a73598301243bc911
                       7f1ad911dc503987457124eed6c35b403f16c8b2
                       b6342c5a2ecb084b1c69d1a862d5ec748cb759d1
                       2c8c96e9b97d48e409a749305c0a1c4c709e9ee9
                       4667d74efe534e60a75fd1b1c4a2e1984ddf708f
                       b80ed27a444e65ce836a0aa090527f750fb51609
                       9e96fdd8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:f1:c2:5e:b9:6f:e8:35:a1:96:ab:36:df:8c:cc:3d:03:43:22:ad]
            modulus: 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
    public exponent: 10001

]