Results

By type

          2022-01-04 02:31:42,548 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-01-04 02:31:47,258 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2022-01-04 02:31:50.566  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2022-01-04 02:32:05.162 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-01-04 02:32:06.450  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-01-04 02:32:07.154  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-01-04 02:32:20.259  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.49 seconds (JVM running for 48.444)
2022-01-04 03:16:37.460  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 03:16:37.479 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 03:16:37.662 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-01-04 03:16:37.667 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 03:16:37.680  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-01-04 03:16:37.683  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 03:16:37.684  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 03:16:37.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 03:16:37.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 03:16:37.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 03:16:37.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 03:16:37.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 03:16:37.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 03:16:37.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 03:16:37.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 03:16:37.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 03:16:39.317  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 03:16:39.320  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 03:16:39.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 03:16:39.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 03:16:39.347  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 03:16:39.347  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 03:16:39.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 03:16:39.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 03:16:39.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 03:16:39.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 03:16:39.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 03:16:39.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 03:16:39.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 03:16:39.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 03:16:39.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 03:16:39.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 03:16:39.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:5a:59:91:63:f9:23:6e:8d:12:d5:29:d4:9b:bf:fc:66:09:32:0d]
            modulus: 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
    public exponent: 10001

] 
2022-01-04 05:34:10.676  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 05:34:10.678 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 05:34:10.680 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:34:10.681 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 05:34:10.682  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:34:10.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 05:34:10.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 05:34:10.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 05:34:10.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 05:34:10.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 05:34:10.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 05:34:10.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:34:10.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:34:10.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:34:10.947  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 05:34:10.948  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 05:34:10.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 05:34:10.949 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:34:10.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 05:34:10.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 05:34:10.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:34:10.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:34:10.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:34:10.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:34:10.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:34:10.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:34:10.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:34:10.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:34:10.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:34:10.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 05:34:11.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:94:e1:39:90:5a:01:9a:f3:c6:2e:9a:a3:c5:9a:7e:b8:dc:be:7b]
            modulus: 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
    public exponent: 10001

] 
2022-01-04 05:42:53.546  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 05:42:53.547 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 05:42:53.549 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:42:53.549 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 05:42:53.550  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:42:53.550  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 05:42:53.550  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 05:42:53.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 05:42:53.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 05:42:53.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 05:42:53.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 05:42:53.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:42:53.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:42:53.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:42:53.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 05:42:53.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 05:42:53.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 05:42:53.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:42:53.651  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 05:42:53.651  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 05:42:53.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:42:53.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:42:53.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:42:53.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:42:53.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:42:53.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:42:53.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:42:53.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:42:53.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:42:53.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 05:42:53.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:54:c9:1a:71:44:37:60:71:8c:be:11:48:5e:d1:af:e6:fc:e6:26]
            modulus: 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
    public exponent: 10001

] 
2022-01-04 05:44:55.018  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 05:44:55.019 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 05:44:55.021 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:44:55.021 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 05:44:55.022  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:44:55.022  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 05:44:55.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 05:44:55.023 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 05:44:55.023 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 05:44:55.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 05:44:55.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 05:44:55.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:44:55.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:44:55.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:44:55.113  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 05:44:55.114  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 05:44:55.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 05:44:55.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:44:55.152  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 05:44:55.153  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 05:44:55.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:44:55.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:44:55.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:44:55.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:44:55.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:44:55.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:44:55.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:44:55.159 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:44:55.159 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:44:55.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 05:44:55.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:4f:08:db:01:f3:4f:66:63:32:b5:81:c8:9d:a4:c1:4f:15:da:b8]
            modulus: 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
    public exponent: 10001

] 
2022-01-04 05:47:35.252  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 05:47:35.254 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 05:47:35.255 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:47:35.256 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 05:47:35.256  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:47:35.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 05:47:35.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 05:47:35.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 05:47:35.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 05:47:35.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 05:47:35.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 05:47:35.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:47:35.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:47:35.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:47:35.416  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 05:47:35.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 05:47:35.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 05:47:35.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:47:35.419  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 05:47:35.420  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 05:47:35.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:47:35.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:47:35.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:47:35.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:47:35.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:47:35.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:47:35.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:47:35.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:47:35.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:47:35.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 05:47:35.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6b:1e:75:70:57:e3:9b:86:dd:95:9d:24:ad:35:cb:24:c0:d1:68:29]
            modulus: c10bece583231ac02ae8600cab2ab1f348e3549fa286c047d8789372694b491fe130c55daef6ba9ca2ba4fe4b881ddfcc48df6a1e444128a266beec01838176485480a3e811fef2afd3ad48e4613256a469f21cbbe1bd097e0885397ed6d903888ae7ac7e36875a1047a6a7510801d62592cb1fc3fc86b7936846519fdca6a241d3c32bbac33122d2643d84b392687ea65de274943ae586efce7fd6ea0daadb7c0d3fde3d8581f66517923efebf102ca419a555d51106dd30925061afe082802a93a66717c0e8dab65e3c4f15e160416b1062bbbd38cfe2c63c017f81cbc6b5bdcdc594999365a30fa8daa0160c4cde0ba2cf2956e259c6b097bc56b46079163
    public exponent: 10001

] 
2022-01-04 05:50:38.418  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 05:50:38.420 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 05:50:38.422 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:50:38.423 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 05:50:38.423  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:50:38.424  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 05:50:38.424  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 05:50:38.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 05:50:38.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 05:50:38.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 05:50:38.450 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 05:50:38.451 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:50:38.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:50:38.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:50:38.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 05:50:38.545  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 05:50:38.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 05:50:38.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:50:38.548  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 05:50:38.549  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 05:50:38.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:50:38.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:50:38.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:50:38.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:50:38.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:50:38.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:50:38.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:50:38.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:50:38.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:50:38.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 05:50:38.558 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:3c:26:01:f5:6e:96:1e:f2:9b:a4:c9:95:28:6a:83:58:c2:e7:55]
            modulus: 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
    public exponent: 10001

] 
2022-01-04 05:54:02.572  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-04 05:54:02.574 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-04 05:54:02.575 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:54:02.575 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-04 05:54:02.575  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-04 05:54:02.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-04 05:54:02.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-04 05:54:02.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-04 05:54:02.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-04 05:54:02.577 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-04 05:54:02.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-04 05:54:02.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:54:02.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-04 05:54:02.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:54:02.655  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-04 05:54:02.656  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-04 05:54:02.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-04 05:54:02.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-04 05:54:02.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-04 05:54:02.660  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-04 05:54:02.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:54:02.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:54:02.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:54:02.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:54:02.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:54:02.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:54:02.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-04 05:54:02.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-04 05:54:02.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-04 05:54:02.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-04 05:54:02.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 442256502405624828906450677515469921471925856002
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 04 02:18:29 UTC 2022
           Final Date: Sun Jan 04 02:18:28 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f]
            modulus: 91dbf391093263e148cf5d7bd88ca698a6a27a832e385725477a45661eeb59e566cfe7c84d782320ea9e9373c6fc70e0ff4c17c5ae08514b1d94f6979a1c948b4d5094d9321fef147336b2be09fe9d1e35916756ad99ddeb5f3bb0dc0c91b8e595aa807a16ad19d105c162598d07542f0b68a275abe52f8c6b17fb3e891fbfb3f684f1e0b1af72632083bab68e8401d1a016a55fdb3a23da562d7084649d50d5d0acdb30f97de5e2ddc44dcf8c22730aa398e6d2116f70220041e3918467b8b0232e585d5accc1fa358ee8b050b3ecc37bfa38292f5b6c2cc70698fee268a09b8a794591fc3dd469f1411dd921fe1535cd20a6417dd15270f4b82129f3f852b29cea0cb86478df6052000614fd7acdb4f13fa65717d976296aeb32a3f5abda6f1d861eb6214f046804b4a72c5143b1e79e16b9040b490bd1cc020a9b8c19d8b9f954ff5bc17142385a71191aceaecc143fc3222b6271ff10279ddd3b2abdf390eb03162f581a17fb15033ea1276291913a9db05a035001097bf7e2a916c4d313
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6fd29da3031c8aa604f71bc572960b47960422b2
                       3401ce57f709c0da13a2d31808467a140847a1bf
                       8b59fda76cd81a2d72852b72a85408f972bcb0c5
                       0722b698518f4e0c588c93a1ff57922f1cd8973f
                       070c69ee24e43764d8d8d9b361ca7bb898d17a7b
                       8bc18b24f5d24eaed53257f0a5aa28c64f686097
                       d23d3e4c48aaa4eb7ea7374250d49c35f86c7665
                       8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5
                       8febc93dac8560510cb069abcb55b9bb04a24d34
                       769fd5afe3724409e7251933b8d6aaa065bb96e6
                       1c8ccd0bd0c90034c2da29a0d9eb33938a66e808
                       9519a0314e1ca28fbf6e13b5d987fe409928069b
                       732f94de65ed8fef1f429dd823a77e2506825d1f
                       156ec576789033770aae49509bc1ca0e41fdcb26
                       97bf9b3edf986859bbe2e430e329c4e138c970cc
                       12b6522a48b31fbe7f0c70c131313f6500912a32
                       8de6efc1bcae47d65583ea20c5a29982556ba455
                       89e7f0ed669463b0b86a40008e98b9ae67104a3e
                       badd0074b5dd86fcbfe169445d27576a05a4caa0
                       ddf438db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:c6:d1:61:f7:9c:fb:a6:77:8b:e3:79:6c:88:fb:7b:a7:b0:b9:bf]
            modulus: f312fd8601a8258bb0c559f4bad28514fb53c90770c897d6a952d6e9c19076d17ea13c456d6ea12961697de8dce81ca04c5d5df44522d6cc060e6cb97f34e50d83d562767eda96f5b417bfac75d940496f8737e83a002bf070dcfcb768090b32d547129623b9520c836a68d866e1dc00c3f9e2a8e59559a1377a5f884f38d9e404ea4d15facacee5fe7318049714c3cf0175843be93eae971e415f60899f3af05413677ab7e0a9f50e469a6284048f2394ab5983107e262fe7aa2b1e39507a664a99c3d513c776da9ed4bb6f6f65fc2972207b2c75879ef0ad48ab99037448e53ae6e9d52307cd32bce20a7c11a1e5c835fa2e2df3b7aefc46dd217bfcff0545
    public exponent: 10001

]