Results

By type

          2022-06-08 02:10:25,606 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-08 02:10:30,292 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-08 02:10:33.099  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 08, 2022 2:10:42 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 08, 2022 2:10:42 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 08, 2022 2:10:42 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 08, 2022 2:10:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-08 02:10:44.709 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-08 02:10:45.930  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-08 02:10:46.617  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-08 02:10:50.202 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-08 02:10:50.205 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-08 02:10:50.206 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-08 02:10:50.209 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-08 02:10:50.415 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-08 02:10:50.419 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-08 02:10:50.901 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-08 02:10:55.803 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 08, 2022 2:10:59 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-08 02:11:00.208  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.195 seconds (JVM running for 46.125)
Jun 08, 2022 2:11:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-08 02:12:09.411  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 02:12:09.498 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 02:12:09.693 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-08 02:12:09.698 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 02:12:09.794  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-08 02:12:09.797  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 02:12:09.798  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 02:12:09.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 02:12:09.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 02:12:09.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 02:12:09.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 02:12:09.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 02:12:10.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 02:12:10.014 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 02:12:10.014 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 02:12:10.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 02:12:11.595  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 02:12:11.602  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 02:12:11.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 02:12:11.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 02:12:11.796  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 02:12:11.797  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 02:12:11.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 02:12:11.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 02:12:11.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 02:12:11.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 02:12:11.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 02:12:11.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 02:12:11.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 02:12:11.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 02:12:11.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 02:12:11.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 02:12:12.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:58:35:a4:0c:a7:a9:22:2a:c7:b1:08:60:62:8e:d5:17:96:89:0f]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:32:22.636  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:32:22.637 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:32:22.639 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:32:22.640 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:32:22.641  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:32:22.642  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:32:22.642  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:32:22.643 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:32:22.643 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:32:22.644 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:32:22.692 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:32:22.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:32:22.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:32:22.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:32:22.917  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:32:22.918  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:32:22.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:32:22.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:32:22.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:32:22.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:32:22.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:32:22.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:32:22.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:32:22.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:32:22.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:32:22.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:32:22.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:32:22.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:32:22.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:32:22.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:32:22.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:96:fc:5d:11:b9:3a:7b:3b:97:e2:3d:1d:36:36:d7:d6:95:8c:f9]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:35:30.257  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:35:30.259 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:35:30.260 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:35:30.261 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:35:30.261  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:35:30.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:35:30.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:35:30.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:35:30.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:35:30.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:35:30.293 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:35:30.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:35:30.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:35:30.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:35:30.401  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:35:30.402  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:35:30.402 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:35:30.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:35:30.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:35:30.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:35:30.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:35:30.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:35:30.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:35:30.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:35:30.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:35:30.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:35:30.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:35:30.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:35:30.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:35:30.410 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:35:30.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:eb:d9:75:81:20:eb:bd:be:5d:4d:f0:81:fb:a0:86:c8:b3:7a:d4]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:37:54.623  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:37:54.624 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:37:54.626 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-08 07:37:54.626 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:37:54.627  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-08 07:37:54.627  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:37:54.627  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:37:54.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:37:54.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:37:54.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:37:54.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:37:54.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:37:54.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:37:54.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:37:54.726  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:37:54.727  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:37:54.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:37:54.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:37:54.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:37:54.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:37:54.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:37:54.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:37:54.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:37:54.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:37:54.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:37:54.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:37:54.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:37:54.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:37:54.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:37:54.792 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:37:54.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:18:08:0f:f9:af:b5:72:cc:e6:35:0b:38:3d:3f:c5:4d:85:6a:64]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:40:39.432  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:40:39.434 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:40:39.436 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:40:39.437 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:40:39.437  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:40:39.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:40:39.439  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:40:39.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:40:39.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:40:39.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:40:39.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:40:39.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:40:39.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:40:39.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:40:39.544  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:40:39.544  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:40:39.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:40:39.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:40:39.546  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:40:39.547  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:40:39.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:40:39.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:40:39.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:40:39.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:40:39.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:40:39.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:40:39.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:40:39.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:40:39.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:40:39.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:40:39.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:42:dc:d5:eb:33:72:71:e1:4a:29:6d:00:68:d0:4b:f4:8a:e1:ab]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:44:36.319  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:44:36.320 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:44:36.322 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:44:36.323 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:44:36.323  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:44:36.324  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:44:36.324  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:44:36.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:44:36.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:44:36.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:44:36.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:44:36.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:44:36.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:44:36.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:44:36.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:44:36.477  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:44:36.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:44:36.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:44:36.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:44:36.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:44:36.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:44:36.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:44:36.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:44:36.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:44:36.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:44:36.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:44:36.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:44:36.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:44:36.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:44:36.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:44:36.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:d1:f9:63:b9:6b:e6:9d:0f:fc:60:13:66:89:3f:c1:e4:77:95:33]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:48:56.092  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:48:56.093 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:48:56.095 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:48:56.096 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:48:56.097  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:48:56.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:48:56.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:48:56.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:48:56.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:48:56.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:48:56.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:48:56.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:48:56.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:48:56.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:48:56.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:48:56.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:48:56.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:48:56.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:48:56.193  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:48:56.193  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:48:56.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:48:56.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:48:56.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:48:56.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:48:56.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:48:56.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:48:56.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:48:56.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:48:56.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:48:56.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:48:56.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: af10753b488b556abf38bd25a8baecd4ac09c4a0062434e27a2d290d3f6c3f9f4a5e5b9c06a8cae8a7560c915afb6913166b45f776a6f03f54ff4079c85da8f4791024c4b32bf8c0c1cdddc5e9ee4b296b1e02a8f51df0b47c646a902c38de0a6b8077ccd58ab88c340226415b8756f9f1b7c52452724d0f22a707558718c1075c0250bfaaeabae470aeb31559b6c22249da326a54ef02872f98f3bd556c1be6439942817e83617351ddf0240e0eaa8b072afc1cb29f609fee85f41dde39fae70f682498344ff9703343693cee92fa277b6e4fc0d51b96598d06f3382902e95b2da84032325cf86eb4ed1094afaf7f8b667ca985efc0a9f251cf54449638dcfedff007554dd9551919bf45a577a5791423ced68fa0020275bb2a9d6172b4fd9fc9a05afb848ac0cc72967141475b40dff3161f567c4ba5f02aeaa72562dfb7a3070d90616154223120314d7370c63089e3203b67874c2eef068daba33f307f61e892ecdd2dc90d9cc15d8255019b43f27b327f8248b1eff806bad66f5efacb0d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:23:cc:32:c3:6e:5f:4e:31:a8:f9:c4:5c:fc:7f:22:0a:28:93:1f]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:51:01.063  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:51:01.064 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:51:01.065 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-08 07:51:01.066 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:51:01.066  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-08 07:51:01.090  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:51:01.091  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:51:01.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:51:01.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:51:01.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:51:01.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:51:01.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:51:01.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:51:01.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:51:01.277  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:51:01.277  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:51:01.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:51:01.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:51:01.292  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:51:01.292  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:51:01.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:51:01.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:51:01.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:51:01.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:51:01.295 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:51:01.295 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:51:01.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:51:01.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:51:01.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:51:01.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:51:01.391 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: af10753b488b556abf38bd25a8baecd4ac09c4a0062434e27a2d290d3f6c3f9f4a5e5b9c06a8cae8a7560c915afb6913166b45f776a6f03f54ff4079c85da8f4791024c4b32bf8c0c1cdddc5e9ee4b296b1e02a8f51df0b47c646a902c38de0a6b8077ccd58ab88c340226415b8756f9f1b7c52452724d0f22a707558718c1075c0250bfaaeabae470aeb31559b6c22249da326a54ef02872f98f3bd556c1be6439942817e83617351ddf0240e0eaa8b072afc1cb29f609fee85f41dde39fae70f682498344ff9703343693cee92fa277b6e4fc0d51b96598d06f3382902e95b2da84032325cf86eb4ed1094afaf7f8b667ca985efc0a9f251cf54449638dcfedff007554dd9551919bf45a577a5791423ced68fa0020275bb2a9d6172b4fd9fc9a05afb848ac0cc72967141475b40dff3161f567c4ba5f02aeaa72562dfb7a3070d90616154223120314d7370c63089e3203b67874c2eef068daba33f307f61e892ecdd2dc90d9cc15d8255019b43f27b327f8248b1eff806bad66f5efacb0d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:a5:30:0d:1c:ca:be:42:cd:2e:9b:9e:e3:c8:a7:0b:61:76:06:6c]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:53:24.437  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:53:24.438 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:53:24.440 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:53:24.441 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:53:24.441  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:53:24.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:53:24.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:53:24.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:53:24.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:53:24.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:53:24.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:53:24.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:53:24.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:53:24.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:53:24.532  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:53:24.533  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:53:24.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:53:24.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:53:24.535  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:53:24.536  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:53:24.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:53:24.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:53:24.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:53:24.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:53:24.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:53:24.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:53:24.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:53:24.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:53:24.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:53:24.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:53:24.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:95:b1:0a:ae:67:5f:d5:01:33:e1:d9:0c:5d:c0:e9:81:38:0a:b2]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 07:58:23.776  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 07:58:23.777 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 07:58:23.779 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:58:23.780 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 07:58:23.780  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 07:58:23.781  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 07:58:23.782  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 07:58:23.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 07:58:23.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 07:58:23.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 07:58:23.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 07:58:23.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:58:23.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 07:58:23.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:58:23.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 07:58:23.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 07:58:23.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 07:58:23.890 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 07:58:23.891  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 07:58:23.891  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 07:58:23.891 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:58:23.891 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:58:23.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:58:23.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:58:23.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:58:23.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:58:23.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 07:58:23.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 07:58:23.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 07:58:23.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 07:58:23.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:57:ec:bf:62:03:4e:83:f8:ea:5d:c8:f2:a9:fc:42:83:9f:4a:cd]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 08:00:04.657  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 08:00:04.658 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 08:00:04.660 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-08 08:00:04.660 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 08:00:04.661  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-08 08:00:04.661  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 08:00:04.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 08:00:04.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 08:00:04.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 08:00:04.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 08:00:04.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 08:00:04.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:00:04.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:00:04.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:00:04.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 08:00:04.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 08:00:04.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 08:00:04.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:00:04.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 08:00:04.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 08:00:04.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:00:04.763 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:00:04.763 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:00:04.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:00:04.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:00:04.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:00:04.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:00:04.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:00:04.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:00:04.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 08:00:04.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:8b:ff:51:32:f4:be:a1:7f:62:2e:da:12:d5:fc:ea:3d:49:c5:23]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 08:01:26.327  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 08:01:26.329 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 08:01:26.330 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-08 08:01:26.331 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 08:01:26.331  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-08 08:01:26.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 08:01:26.332  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 08:01:26.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 08:01:26.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 08:01:26.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 08:01:26.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 08:01:26.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:01:26.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:01:26.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:01:26.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 08:01:26.424  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 08:01:26.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 08:01:26.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:01:26.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 08:01:26.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 08:01:26.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:01:26.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:01:26.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:01:26.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:01:26.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:01:26.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:01:26.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:01:26.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:01:26.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:01:26.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 08:01:26.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:cc:6c:f2:49:7c:14:89:c0:f3:95:dc:46:36:b3:27:1f:a3:91:5e]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 08:03:51.033  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 08:03:51.034 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 08:03:51.036 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-08 08:03:51.036 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 08:03:51.037  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-08 08:03:51.037  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 08:03:51.037  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 08:03:51.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 08:03:51.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 08:03:51.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 08:03:51.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 08:03:51.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:03:51.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:03:51.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:03:51.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 08:03:51.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 08:03:51.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 08:03:51.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:03:51.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 08:03:51.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 08:03:51.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:03:51.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:03:51.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:03:51.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:03:51.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:03:51.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:03:51.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:03:51.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:03:51.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:03:51.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 08:03:51.291 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:5e:f4:75:cb:e2:55:35:18:0d:d3:70:18:5c:33:32:db:13:fa:a1]
            modulus: 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
    public exponent: 10001

] 
2022-06-08 08:07:52.652  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-08 08:07:52.653 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-08 08:07:52.655 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 08:07:52.656 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-08 08:07:52.656  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-08 08:07:52.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-08 08:07:52.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-08 08:07:52.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-08 08:07:52.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-08 08:07:52.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-08 08:07:52.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-08 08:07:52.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:07:52.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-08 08:07:52.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:07:52.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-08 08:07:52.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-08 08:07:52.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-08 08:07:52.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-08 08:07:52.770  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-08 08:07:52.770  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-08 08:07:52.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:07:52.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:07:52.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:07:52.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:07:52.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:07:52.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:07:52.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-08 08:07:52.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-08 08:07:52.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-08 08:07:52.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-08 08:07:52.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509415271303144873057533481101930615417384766864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 08 02:07:12 UTC 2022
           Final Date: Mon Jun 07 02:07:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c
                       4f78fae73d0a43ae507937677d9d03df866c1428
                       3c7d1fa3da2cc870f02940c925afca0e32a49f1c
                       46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5
                       0b9bfb15a94a8bf3b21fa604e3c1861c24225b95
                       6ba2d0d6835222c563e7e83b63022c3ba7dd139a
                       7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2
                       5e288033479c8583ec245dd06c41da90bec07598
                       d84695be959f6f0c92ad3fd3ae57d15a0af7141b
                       a785ff6fba2f37610775c4592c695a0e7dc66cef
                       1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f
                       40132611603d1efccf094148c9b45b187ba19122
                       b26312166b052827daa08c61e8e2a5cc3f8fc467
                       7d43d108dccb1c2420f35e9ad9988f1f142aaebd
                       341ecf46a8eb77667d593a5a5c5c64231ac5b500
                       508e4f43357c1fafc5da827514279daba2ffad9e
                       b462707b3760d8f3c8b4668668f181f7fe89529d
                       59ba9bd7bc45561b8b7be38e17464fc380985569
                       29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e
                       026f2ca4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:36:dd:60:58:71:92:30:29:18:cc:03:37:80:d8:02:24:8e:0c:a9]
            modulus: d5d09510bc0511ae58451461c9ba5ab724557845552a35a11cfb302c4817e1edaf852ee186f8763ac893c417c8fc7fa6f97d9add7fab5909bf31cbb74be8ed5933cb540c2d62b270a02d23f01d8360db2636f9a3d925afbeb850d64e875c70de854db8a090d49ee1b8fc720ee192f17d3a00e95f90860fb3cd9a82663d26c5c439ef459e0074e3b833fcbd615d455762af9a5cad96fabb8f3217d4a89c5b96d49834b86f023b6ffdef657dd7876df73abd97bc01e74b9fdbba988d9d5f6a5dd0caf8a4aa6778513c0cab08d1d2f71da272afb8c46f1ace76630537dbd1f3e797eb3aaddd9dfad22a6b2f7464c7d793a38849573498ce2d8d3d3cdcfdd36bee81
    public exponent: 10001

]