Results

By type

          2022-05-13 11:34:58,611 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-13 11:35:03,504 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-13 11:35:06.503  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 13, 2022 11:35:16 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 13, 2022 11:35:16 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 13, 2022 11:35:16 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 13, 2022 11:35:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-13 11:35:18.801 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-13 11:35:20.313  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-13 11:35:21.095  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-13 11:35:24.212 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-13 11:35:24.215 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-13 11:35:24.217 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-13 11:35:24.300 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-13 11:35:24.501 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-13 11:35:24.504 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-13 11:35:25.000 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-13 11:35:30.003 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 13, 2022 11:35:33 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-13 11:35:34.816  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.815 seconds (JVM running for 47.674)
May 13, 2022 11:35:39 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-13 11:36:39.208  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 11:36:39.294 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 11:36:39.327 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-13 11:36:39.395 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 11:36:39.503  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-13 11:36:39.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 11:36:39.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 11:36:39.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 11:36:39.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 11:36:39.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 11:36:39.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 11:36:39.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 11:36:39.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 11:36:39.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 11:36:39.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 11:36:39.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 11:36:41.160  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 11:36:41.162  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 11:36:41.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 11:36:41.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 11:36:41.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 11:36:41.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 11:36:41.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 11:36:41.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 11:36:41.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 11:36:41.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 11:36:41.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 11:36:41.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 11:36:41.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 11:36:41.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 11:36:41.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 11:36:41.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 11:36:41.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:bb:cc:e4:37:fb:87:3d:28:23:99:c3:03:b3:53:36:88:f4:a8:0d]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 13:39:59.499  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 13:39:59.500 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 13:39:59.503 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 13:39:59.504 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 13:39:59.505  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 13:39:59.506  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 13:39:59.506  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 13:39:59.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 13:39:59.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 13:39:59.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 13:39:59.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 13:39:59.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:39:59.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:39:59.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:39:59.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 13:39:59.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 13:39:59.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 13:39:59.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:39:59.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 13:39:59.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 13:39:59.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:39:59.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:39:59.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:39:59.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:39:59.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:39:59.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:39:59.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:39:59.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:39:59.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:39:59.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 13:39:59.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:cd:87:c2:7c:c4:c9:f9:06:bb:7b:24:a1:e1:42:b5:b6:73:c7:a8]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 13:43:46.196  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 13:43:46.197 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 13:43:46.199 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 13:43:46.200 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 13:43:46.201  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 13:43:46.201  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 13:43:46.202  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 13:43:46.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 13:43:46.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 13:43:46.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 13:43:46.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 13:43:46.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:43:46.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:43:46.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:43:46.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 13:43:46.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 13:43:46.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 13:43:46.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:43:46.427  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 13:43:46.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 13:43:46.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:43:46.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:43:46.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:43:46.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:43:46.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:43:46.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:43:46.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:43:46.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:43:46.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:43:46.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 13:43:46.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: e36b8712d25d4f3b4697d75c26547d36730ef5851eec3bb791f884621e2f0ab8be819bb155cd65205dbf0e5a24e4b7679103bb6c54a868a5d85f723095dc97398d31f2c78633db1cf780ddabb6a287b568b241fada3e79cfec601d28aedf03f7e661cdbbb4254669d03aa555b2b1b77005132205ff3bd838ae20cca8404a7ac36dd02433bd8913bd316815e74b058761c2db1f7735e1cbc02df3f474ce5e20a53612ae335df8bdb0ed9c7e6624f5dae0ef38cc237a6e43c52e849bc01938307398658ac047688602f62c201a88077c2c7785cf798da540facb8374f0137ddb14bdcf2491e1a8e593167718615cb4253dff55345333c670f3c0dc344e6adbf5f27817adcf4a5c13619af8476d7525810e11ec1ab9537fdacec0c823577f58e6cc56783220dc0dc487301defbb7f231bcf71437de348b8cbde7e8b1efe5f00fc2fd43cfa8b3a5323036c4dcfe5a2bc60ef396392fdd9653ee094ecc2c8a6b96784a7fa9f03afff2260e06e8ceaf0cf204e971ee87dc0b742eea3e34578a86ce319
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:fd:0e:76:60:b7:52:b2:a2:42:23:0b:3b:44:35:0a:f6:a1:f1:26]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 13:45:57.625  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 13:45:57.627 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 13:45:57.630 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-13 13:45:57.631 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 13:45:57.632  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-13 13:45:57.632  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 13:45:57.633  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 13:45:57.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 13:45:57.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 13:45:57.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 13:45:57.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 13:45:57.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:45:57.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:45:57.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:45:57.801  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 13:45:57.801  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 13:45:57.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 13:45:57.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:45:57.803  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 13:45:57.804  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 13:45:57.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:45:57.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:45:57.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:45:57.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:45:57.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:45:57.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:45:57.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:45:57.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:45:57.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:45:57.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 13:45:57.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:63:67:94:18:47:35:8f:1b:19:6e:74:8b:07:fa:28:1b:d9:7e:df]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 13:49:15.738  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 13:49:15.740 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 13:49:15.742 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-13 13:49:15.743 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 13:49:15.744  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-13 13:49:15.744  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 13:49:15.745  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 13:49:15.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 13:49:15.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 13:49:15.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 13:49:15.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 13:49:15.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:49:15.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:49:15.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:49:15.905  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 13:49:15.906  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 13:49:15.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 13:49:15.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:49:15.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 13:49:15.911  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 13:49:15.911 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:49:15.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:49:15.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:49:15.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:49:15.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:49:15.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:49:15.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:49:15.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:49:15.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:49:15.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 13:49:15.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:e7:16:74:31:44:7d:ed:84:4d:44:11:39:c5:e0:32:aa:89:e0:8d]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 13:53:26.576  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 13:53:26.577 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 13:53:26.578 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 13:53:26.579 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 13:53:26.579  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 13:53:26.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 13:53:26.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 13:53:26.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 13:53:26.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 13:53:26.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 13:53:26.586 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 13:53:26.587 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:53:26.587 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:53:26.587 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:53:26.691  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 13:53:26.692  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 13:53:26.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 13:53:26.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:53:26.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 13:53:26.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 13:53:26.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:53:26.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:53:26.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:53:26.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:53:26.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:53:26.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:53:26.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:53:26.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:53:26.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:53:26.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 13:53:26.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: e36b8712d25d4f3b4697d75c26547d36730ef5851eec3bb791f884621e2f0ab8be819bb155cd65205dbf0e5a24e4b7679103bb6c54a868a5d85f723095dc97398d31f2c78633db1cf780ddabb6a287b568b241fada3e79cfec601d28aedf03f7e661cdbbb4254669d03aa555b2b1b77005132205ff3bd838ae20cca8404a7ac36dd02433bd8913bd316815e74b058761c2db1f7735e1cbc02df3f474ce5e20a53612ae335df8bdb0ed9c7e6624f5dae0ef38cc237a6e43c52e849bc01938307398658ac047688602f62c201a88077c2c7785cf798da540facb8374f0137ddb14bdcf2491e1a8e593167718615cb4253dff55345333c670f3c0dc344e6adbf5f27817adcf4a5c13619af8476d7525810e11ec1ab9537fdacec0c823577f58e6cc56783220dc0dc487301defbb7f231bcf71437de348b8cbde7e8b1efe5f00fc2fd43cfa8b3a5323036c4dcfe5a2bc60ef396392fdd9653ee094ecc2c8a6b96784a7fa9f03afff2260e06e8ceaf0cf204e971ee87dc0b742eea3e34578a86ce319
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:38:ad:47:de:6b:00:25:98:b9:d5:ad:84:ff:85:dc:2b:2f:dc:91]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 13:58:39.884  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 13:58:39.885 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 13:58:39.886 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-13 13:58:39.886 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 13:58:39.887  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-13 13:58:39.889  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 13:58:39.890  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 13:58:39.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 13:58:39.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 13:58:39.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 13:58:39.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 13:58:39.894 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:58:39.894 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 13:58:39.894 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:58:39.995  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 13:58:39.996  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 13:58:39.997 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 13:58:39.997 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 13:58:40.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 13:58:40.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 13:58:40.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:58:40.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:58:40.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:58:40.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:58:40.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:58:40.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:58:40.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 13:58:40.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 13:58:40.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 13:58:40.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 13:58:40.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:db:54:d9:ca:e5:97:1b:1b:59:91:33:0f:cf:b8:e2:aa:8d:92:74]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:00:28.193  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:00:28.194 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:00:28.196 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:00:28.197 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:00:28.197  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:00:28.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:00:28.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:00:28.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:00:28.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:00:28.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:00:28.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:00:28.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:00:28.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:00:28.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:00:28.313  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:00:28.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:00:28.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:00:28.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:00:28.315  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:00:28.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:00:28.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:00:28.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:00:28.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:00:28.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:00:28.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:00:28.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:00:28.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:00:28.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:00:28.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:00:28.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:00:28.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:a7:5b:09:24:c5:e0:bd:09:8c:25:68:02:93:10:75:e7:10:eb:69]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:05:06.024  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:05:06.025 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:05:06.027 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:05:06.028 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:05:06.028  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:05:06.030  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:05:06.030  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:05:06.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:05:06.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:05:06.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:05:06.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:05:06.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:05:06.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:05:06.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:05:06.135  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:05:06.135  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:05:06.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:05:06.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:05:06.138  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:05:06.138  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:05:06.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:05:06.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:05:06.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:05:06.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:05:06.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:05:06.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:05:06.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:05:06.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:05:06.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:05:06.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:05:06.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:f8:37:a8:0e:55:46:5c:d6:81:72:9d:5e:6f:29:02:00:a9:ff:ea]
            modulus: b0afcc8ad51c2ed436787aea1e16fc3f5dc7ac8ed908684ae345b686af6b1e03e9e86aecde1a03a14960304565e62c31e3647e69559911f9ed883040f8b8417a91da7d2a73a1c5fb12069e34cd134edc280058f560763c6b422f85609956903c6cba0843276f38e37e4c1cedc9760e2ffe5d448fb9c79cecc61dfd1a1b639bb9a18214a907f32f0bd75954694d8954e97db1765777f9d0607c36defeb0f7f65642d16e25d739a5ed964044fbab3d34eb9c4095cbdc4bbb6a91d7f9f9772991838df2002777ab438b4ee5791233cdee309da5b79f53eba7796db4d3259a494518863cf18ea2688464117466597864acce69a7ce8189438b557de3057a13183fd5
    public exponent: 10001

] 
2022-05-13 14:07:33.769  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:07:33.770 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:07:33.772 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-13 14:07:33.772 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:07:33.772  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-13 14:07:33.773  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:07:33.773  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:07:33.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:07:33.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:07:33.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:07:33.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:07:33.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:07:33.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:07:33.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:07:33.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:07:33.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:07:33.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:07:33.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:07:33.892  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:07:33.893  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:07:33.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:07:33.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:07:33.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:07:33.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:07:33.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:07:33.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:07:33.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:07:33.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:07:33.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:07:33.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:07:33.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:73:6e:df:84:c5:d0:18:f6:91:d5:b8:e4:2b:0c:94:1c:da:d6:4f]
            modulus: dc23280aaf4ae0460b6fa302481b049e608e4a7eb614eee3deb0b1af97093259bf373c267f4744996c946b2294605a3eb1ac1266dfdc83ed84f3f171cefaadab5e5c09ea3e81bc9a8be3dd355b3d6773a67a8de6d1a68f62fc1073cdd9ef3fd3a380db1a11d986f579bf77d9e2b58ccf1adf15112f936ffa975198332cd018ce19ea4a9eb2b49c6af894de78b190d59a12b01dbf5b5f85aa10c5e63a3e3153cf1c5e6d5be806b967326c1619652c8ae132ce7aae8674bcd7145a76bed01520dfdb26b264cdacddd92b088fbdd45dca427149f14860b67340183a2d905d84130fbc425d10506084b16dae11aa30c393f72ddde1661b9eabcef1a8957c13bcd703
    public exponent: 10001

] 
2022-05-13 14:09:08.065  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:09:08.066 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:09:08.068 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-13 14:09:08.069 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:09:08.069  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-13 14:09:08.069  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:09:08.070  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:09:08.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:09:08.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:09:08.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:09:08.076 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:09:08.076 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:09:08.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:09:08.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:09:08.190  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:09:08.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:09:08.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:09:08.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:09:08.192  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:09:08.192  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:09:08.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:09:08.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:09:08.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:09:08.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:09:08.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:09:08.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:09:08.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:09:08.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:09:08.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:09:08.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:09:08.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:f3:ac:f7:c5:ba:80:57:a8:a4:9d:6a:70:b1:16:71:d1:63:01:bc]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:12:59.879  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:12:59.880 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:12:59.881 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:12:59.881 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:12:59.882  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:12:59.882  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:12:59.882  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:12:59.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:12:59.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:12:59.883 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:12:59.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:12:59.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:12:59.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:12:59.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:13:00.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:13:00.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:13:00.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:13:00.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:13:00.012  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:13:00.013  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:13:00.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:13:00.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:13:00.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:13:00.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:13:00.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:13:00.014 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:13:00.014 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:13:00.014 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:13:00.014 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:13:00.014 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:13:00.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:2a:a3:9b:74:ec:b6:73:9a:1c:20:12:ac:63:3b:dd:c8:d8:b5:d5]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:19:59.225  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:19:59.226 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:19:59.227 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:19:59.228 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:19:59.228  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:19:59.228  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:19:59.228  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:19:59.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:19:59.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:19:59.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:19:59.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:19:59.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:19:59.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:19:59.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:19:59.363  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:19:59.364  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:19:59.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:19:59.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:19:59.366  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:19:59.367  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:19:59.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:19:59.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:19:59.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:19:59.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:19:59.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:19:59.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:19:59.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:19:59.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:19:59.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:19:59.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:19:59.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: e36b8712d25d4f3b4697d75c26547d36730ef5851eec3bb791f884621e2f0ab8be819bb155cd65205dbf0e5a24e4b7679103bb6c54a868a5d85f723095dc97398d31f2c78633db1cf780ddabb6a287b568b241fada3e79cfec601d28aedf03f7e661cdbbb4254669d03aa555b2b1b77005132205ff3bd838ae20cca8404a7ac36dd02433bd8913bd316815e74b058761c2db1f7735e1cbc02df3f474ce5e20a53612ae335df8bdb0ed9c7e6624f5dae0ef38cc237a6e43c52e849bc01938307398658ac047688602f62c201a88077c2c7785cf798da540facb8374f0137ddb14bdcf2491e1a8e593167718615cb4253dff55345333c670f3c0dc344e6adbf5f27817adcf4a5c13619af8476d7525810e11ec1ab9537fdacec0c823577f58e6cc56783220dc0dc487301defbb7f231bcf71437de348b8cbde7e8b1efe5f00fc2fd43cfa8b3a5323036c4dcfe5a2bc60ef396392fdd9653ee094ecc2c8a6b96784a7fa9f03afff2260e06e8ceaf0cf204e971ee87dc0b742eea3e34578a86ce319
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:7d:fe:6d:0e:a2:d6:11:4d:a5:31:ce:82:95:1a:44:bc:32:12:96]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:26:42.616  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:26:42.617 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:26:42.619 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:26:42.619 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:26:42.620  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:26:42.620  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:26:42.620  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:26:42.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:26:42.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:26:42.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:26:42.626 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:26:42.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:26:42.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:26:42.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:26:42.725  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:26:42.725  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:26:42.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:26:42.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:26:42.728  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:26:42.729  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:26:42.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:26:42.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:26:42.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:26:42.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:26:42.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:26:42.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:26:42.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:26:42.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:26:42.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:26:42.733 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:26:42.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 719634843001109182812564540155713640459403978228
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:31:24 UTC 2022
           Final Date: Wed May 12 11:31:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd
                       43ee80cf5e1e1d9dc968140815b49160aa5f4eb8
                       a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc
                       3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3
                       d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4
                       30db5708add4adc3006d25c21db2d3958e5fff2a
                       3737696c3e0026d9126542ad2982dfa20c05a994
                       938f6d46a54a3424bc11abd9e65cb4b58adae5fa
                       70722236742c5d10013e9c0707ffb8b94c9f0dc2
                       61fa91fe74ba02914ffe0192d89df37dfeff8925
                       71025a01c3fac121cc11a0af903b3b2551a157dd
                       eb2b7b579e9ca3f29968a215e36a630a64a81eb3
                       e9b0dbc3de397e193e21406ed40f6d2369b5f3fc
                       47e4fe471ec1b3a71c6b621600d04476ee4eae6b
                       74827528ad8082ace5210e7e05e26ad7bcdc8df0
                       3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936
                       9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41
                       b532bec482bbf50fa22dec1fa77f7a458215e2ac
                       de1accde67665f481bea50a36d998b50ee76fe64
                       575811aa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:34:d4:c5:de:f3:ff:9a:3b:60:48:fe:c0:70:e0:a8:99:09:f3:74]
            modulus: a835adf4310a8dd63b7067598085092a96292e51f701e7a0ab57d26304be0e287739757bae807b33f7eef93a43d2fb717f72a836f0cf2bee34b69e24543ad400077affcabbaf1dba19f205d8916eecd5328bbc913f07e89aaaa352b624ccfe5819f5deb1b3b9bcf0d340377442dd18a62b60f683a490a0ed621e3e2fd8412469d89da8c337bdd5a6be3736f0bc265e689b60cc0980b6f6448e86415e7fb54f8c42a8e3824711c614d281a636f5f92682199e61a84a86a1e349a558445d107d6e71f5175c2139da87b8f29bb59d5378d9ed3903cd86072c992984b19a4f73e7e5cf175906b01035325be9cb223f87ee8fd6bd67e75599aa9ce0310fc82118eae7
    public exponent: 10001

]