Results

By type

          2022-05-20 18:23:45,299 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-20 18:23:49,696 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-20 18:23:52.893  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 20, 2022 6:24:02 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 20, 2022 6:24:02 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 20, 2022 6:24:02 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 20, 2022 6:24:02 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-20 18:24:04.588 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-20 18:24:05.811  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-20 18:24:06.403  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-20 18:24:09.798 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-20 18:24:09.800 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-20 18:24:09.801 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-20 18:24:09.805 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-20 18:24:10.090 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-20 18:24:10.092 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-20 18:24:10.590 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-20 18:24:15.086 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 20, 2022 6:24:18 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-20 18:24:19.484  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.801 seconds (JVM running for 45.349)
May 20, 2022 6:24:26 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-20 18:25:19.498  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 18:25:19.598 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 18:25:19.712 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-20 18:25:19.715 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 18:25:19.793  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-20 18:25:19.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 18:25:19.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 18:25:19.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 18:25:19.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 18:25:19.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 18:25:19.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 18:25:19.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 18:25:20.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 18:25:20.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 18:25:20.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 18:25:20.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 18:25:21.469  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 18:25:21.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 18:25:21.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 18:25:21.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 18:25:21.479  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 18:25:21.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 18:25:21.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 18:25:21.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 18:25:21.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 18:25:21.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 18:25:21.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 18:25:21.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 18:25:21.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 18:25:21.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 18:25:21.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 18:25:21.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 18:25:21.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:ed:8a:34:40:13:1c:45:78:ac:5c:08:f7:a2:6a:13:77:a7:ef:1d]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 22:56:35.671  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 22:56:35.672 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 22:56:35.673 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 22:56:35.674 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 22:56:35.675  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 22:56:35.676  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 22:56:35.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 22:56:35.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 22:56:35.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 22:56:35.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 22:56:35.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 22:56:35.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 22:56:35.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 22:56:35.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 22:56:35.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 22:56:35.902  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 22:56:35.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 22:56:35.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 22:56:35.908  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 22:56:35.909  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 22:56:35.909 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 22:56:35.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 22:56:35.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 22:56:35.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 22:56:35.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 22:56:35.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 22:56:35.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 22:56:35.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 22:56:35.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 22:56:35.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 22:56:35.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:1a:e7:b6:62:a4:75:78:51:5f:7c:c3:08:9c:0c:09:e9:6e:c6:a0]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:05:26.692  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:05:26.694 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:05:26.697 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:05:26.698 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:05:26.698  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:05:26.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:05:26.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:05:26.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:05:26.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:05:26.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:05:26.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:05:26.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:05:26.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:05:26.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:05:26.893  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:05:26.894  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:05:26.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:05:26.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:05:26.897  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:05:26.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:05:26.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:05:26.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:05:26.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:05:26.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:05:26.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:05:26.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:05:26.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:05:26.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:05:26.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:05:26.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:05:26.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:af:37:e4:fa:d9:30:c5:7f:e5:bd:a0:38:98:9b:e0:2b:4b:ab:ce]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:09:31.447  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:09:31.448 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:09:31.449 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-20 23:09:31.450 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:09:31.451  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-20 23:09:31.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:09:31.452  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:09:31.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:09:31.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:09:31.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:09:31.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:09:31.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:09:31.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:09:31.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:09:31.612  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:09:31.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:09:31.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:09:31.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:09:31.617  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:09:31.617  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:09:31.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:09:31.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:09:31.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:09:31.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:09:31.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:09:31.620 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:09:31.620 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:09:31.621 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:09:31.621 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:09:31.622 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:09:31.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:44:ec:2e:a2:49:fb:8b:44:d5:fb:23:4d:16:7f:17:ae:17:31:d2]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:10:24.235  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:10:24.236 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:10:24.238 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:10:24.238 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:10:24.239  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:10:24.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:10:24.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:10:24.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:10:24.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:10:24.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:10:24.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:10:24.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:10:24.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:10:24.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:10:24.337  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:10:24.338  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:10:24.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:10:24.339 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:10:24.341  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:10:24.341  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:10:24.342 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:10:24.342 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:10:24.343 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:10:24.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:10:24.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:10:24.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:10:24.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:10:24.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:10:24.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:10:24.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:10:24.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:d6:d0:14:8d:f1:1f:e1:f9:da:3d:10:d1:04:cc:e4:c8:02:7f:5d]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:17:59.930  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:17:59.932 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:17:59.933 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:17:59.934 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:17:59.934  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:17:59.935  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:17:59.935  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:17:59.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:17:59.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:17:59.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:17:59.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:17:59.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:17:59.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:17:59.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:18:00.082  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:18:00.083  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:18:00.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:18:00.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:18:00.086  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:18:00.086  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:18:00.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:18:00.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:18:00.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:18:00.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:18:00.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:18:00.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:18:00.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:18:00.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:18:00.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:18:00.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:18:00.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:63:db:15:d9:33:8a:7c:92:c2:e3:53:15:aa:fb:03:c3:30:0a:ba]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:23:42.045  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:23:42.046 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:23:42.048 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:23:42.048 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:23:42.049  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:23:42.049  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:23:42.049  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:23:42.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:23:42.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:23:42.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:23:42.055 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:23:42.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:23:42.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:23:42.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:23:42.173  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:23:42.173  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:23:42.174 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:23:42.174 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:23:42.175  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:23:42.175  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:23:42.175 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:23:42.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:23:42.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:23:42.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:23:42.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:23:42.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:23:42.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:23:42.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:23:42.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:23:42.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:23:42.180 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:15:f3:93:90:72:af:fc:f5:44:a2:71:f2:c2:77:48:1e:7d:e0:36]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:30:45.988  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:30:45.990 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:30:45.992 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:30:45.993 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:30:45.993  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 23:30:45.993  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:30:45.994  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:30:45.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:30:45.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:30:45.995 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:30:46.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:30:46.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:30:46.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:30:46.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:30:46.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:30:46.094  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:30:46.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:30:46.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:30:46.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:30:46.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:30:46.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:30:46.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:30:46.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:30:46.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:30:46.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:30:46.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:30:46.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:30:46.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:30:46.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:30:46.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:30:46.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:4e:aa:8a:1b:9f:05:d1:e9:74:7f:c0:bd:f0:a6:4f:80:0b:5f:c3]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 23:34:58.108  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 23:34:58.110 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 23:34:58.112 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-20 23:34:58.113 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 23:34:58.113  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-20 23:34:58.114  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 23:34:58.114  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 23:34:58.115 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 23:34:58.115 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 23:34:58.116 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 23:34:58.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 23:34:58.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:34:58.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 23:34:58.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:34:58.198  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 23:34:58.199  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 23:34:58.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 23:34:58.200 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 23:34:58.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 23:34:58.203  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 23:34:58.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:34:58.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:34:58.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:34:58.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:34:58.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:34:58.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:34:58.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 23:34:58.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 23:34:58.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 23:34:58.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 23:34:58.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3218719463060024673605947257523774989138728131
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 18:19:34 UTC 2022
           Final Date: Wed May 19 18:19:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92
                       7acaaccefbd77f6f2716cbffd27d861fb56c10b2
                       49ee997178482fc5bf90f45605f49e8199c3c9ba
                       b4d42f341ba1abe2f52c6edda4fa6e67b1883c30
                       5a99aed75a300fc4d209b477691cb712f99a5b75
                       42e8798ef843acde040858cf530f348a6c3e32c1
                       9f43baed1f536897b78f1933b94c6709a1640cd1
                       5cba12e57492e736bc208136cedc04c115afbbcf
                       29ca94ab11c30b0f07c1f58acc0014e2b93694b3
                       896a7fabca9e187cceb9b9e5b858db26efd2ae84
                       c1020407847f1fcdfafecb2bb08d6a6600b4a02c
                       e0b38aa7cbafc19f2634b01e39d00f471b12aa2a
                       45267b712f15ed6462a58337fe46da4e5270e4b7
                       b795fc39d0a3be92cf244bfdff982417ed339318
                       2b0c886049afd0b4bca93e1b5d937b10000fdc06
                       a2c3dbe916aeb5ec981109d022b6f78c37d16d01
                       2ba0f019dfa164224245c95926fba1eed2a16d04
                       d119f356a225b95e6a1cb9ebefe63ab495e0877d
                       f67888810998f94dc9ab2ffe09752106a8050116
                       108c55d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:f2:37:ea:7d:52:4f:77:d5:1f:15:82:a7:ce:05:22:29:f7:6f:85]
            modulus: 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
    public exponent: 10001

]