Results

By type

          2022-03-09 03:01:04,646 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-09 03:01:05,942 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-09 03:01:06.759  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 09, 2022 3:01:08 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 09, 2022 3:01:08 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 09, 2022 3:01:08 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 09, 2022 3:01:08 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-09 03:01:09.670 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-09 03:01:09.996  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-09 03:01:10.184  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-09 03:01:10.986 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-09 03:01:10.990 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-09 03:01:10.991 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-09 03:01:10.996 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-09 03:01:11.045 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-03-09 03:01:11.058 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-09 03:01:11.218 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-09 03:01:11.835 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 09, 2022 3:01:12 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-09 03:01:13.013  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.353 seconds (JVM running for 11.589)
Mar 09, 2022 3:01:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-09 03:01:50.104  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 03:01:50.124 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 03:01:50.161 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-09 03:01:50.166 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 03:01:50.182  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-09 03:01:50.185  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 03:01:50.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 03:01:50.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 03:01:50.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 03:01:50.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 03:01:50.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 03:01:50.201 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 03:01:50.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 03:01:50.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 03:01:50.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 03:01:50.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 03:01:50.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 03:01:50.996  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 03:01:50.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 03:01:50.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 03:01:51.016  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 03:01:51.018  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 03:01:51.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 03:01:51.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 03:01:51.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 03:01:51.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 03:01:51.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 03:01:51.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 03:01:51.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 03:01:51.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 03:01:51.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 03:01:51.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 03:01:51.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:f3:48:87:d8:ba:b7:e4:12:bf:a2:df:25:99:9f:aa:0f:eb:bc:11]
            modulus: baa7f4705d528ed0c5d4a496bbd5b9ffadd6b4434199612a8cbf5f79d7e331ec18cf4ae038b7334125c7187744ed74ef049cf573e1597fcd8ada6d30901abab5ec1695ab7578e5ea5160038a8f72eb9147d3bc15cd03a6ceb8b115cf940e528cf8d37f46224ffef0cb2bfd7035fe185a3c7f7030ec840d5f4635453c1f9ac07f8749537cd0d620dea1f4f8ded7ab70d29ae617e643479607f65bdf806cb885b02c7c26ba635e4552b6bac07400a60d641799f646c8de02586cc8afafeb158196adeded919c413c88fcdf3a75b2fe11f2f807bc8eb80ab0afe9d43afc14d2f75becb4e5cf2878f45eddea1f2b821b0914e3a7fcc371ffcd27c32211bc50fe5b1f
    public exponent: 10001

] 
2022-03-09 04:05:17.724  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:05:17.729 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:05:17.734 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-09 04:05:17.735 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:05:17.736  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-09 04:05:17.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:05:17.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:05:17.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:05:17.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:05:17.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:05:17.752 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:05:17.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:05:17.754 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:05:17.754 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:05:17.960  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:05:17.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:05:17.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:05:17.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:05:17.967  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:05:17.967  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:05:17.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:05:17.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:05:17.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:05:17.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:05:17.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:05:17.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:05:17.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:05:17.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:05:17.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:05:17.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:05:17.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: cf6499f89bc35339b4f7e5ab916682c7a695954a0b11e7ef3296e51553222d5ae0c2fd4e89cec903ec6f1543b65275d46770d6cb42f477a23781118315802315861945735d5d2338af3a41e59b8aa77cd976a658bbf346c477308ebff1c37fe81486189cae73a50f1765a546c45a97fb452e65f146a1e3bf7908c2a92c2f94df093a54dd0ee7d6b2a5cfb08b888530d8db503cd6044354e86a0e4882472566366270cbc560ac8dade065c5d3812ee7386a1f795c405fddbcac9f32d903de8421651248d456e2351912b794153a9a89d11117ca5dfa5bff4b9c51bd9b49388762bee675a77ef09256301f9a8748e87478650f8ade4492b1134f2cfca12dc68dad759ed32ca5e30bd8486412c32294c168a687fc2cf8299eb082137aeda142fe92f0578299fbef0efb1dd3ec317ad0f2bfebbf84d47111d48d2526219ced47465d8df9447a98ac9b19d79a253b614a5e85acdaf8995c9072c78d840ab2a1013cbc2483373ecf43c18ddda24d571a70c7af27ae0a86b5c3986852b2c5fe7392b233
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:0a:09:61:f9:41:d0:b4:d1:ef:ba:10:9b:d7:4a:5a:c4:81:e8:ab]
            modulus: 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
    public exponent: 10001

] 
2022-03-09 04:06:27.596  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:06:27.600 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:06:27.604 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-09 04:06:27.607 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:06:27.608  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-09 04:06:27.610  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:06:27.610  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:06:27.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:06:27.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:06:27.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:06:27.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:06:27.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:06:27.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:06:27.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:06:27.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:06:27.885  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:06:27.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:06:27.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:06:27.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:06:27.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:06:27.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:06:27.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:06:27.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:06:27.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:06:27.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:06:27.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:06:27.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:06:27.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:06:27.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:06:27.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:06:27.903 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:7c:c3:42:51:39:34:68:5f:26:86:9b:10:dc:dc:a2:bd:5d:49:95]
            modulus: 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
    public exponent: 10001

] 
2022-03-09 04:08:00.406  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:08:00.409 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:08:00.414 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-09 04:08:00.414 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:08:00.415  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-09 04:08:00.416  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:08:00.416  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:08:00.416 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:08:00.417 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:08:00.417 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:08:00.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:08:00.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:08:00.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:08:00.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:08:00.610  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:08:00.612  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:08:00.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:08:00.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:08:00.617  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:08:00.618  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:08:00.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:08:00.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:08:00.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:08:00.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:08:00.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:08:00.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:08:00.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:08:00.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:08:00.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:08:00.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:08:00.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: cf6499f89bc35339b4f7e5ab916682c7a695954a0b11e7ef3296e51553222d5ae0c2fd4e89cec903ec6f1543b65275d46770d6cb42f477a23781118315802315861945735d5d2338af3a41e59b8aa77cd976a658bbf346c477308ebff1c37fe81486189cae73a50f1765a546c45a97fb452e65f146a1e3bf7908c2a92c2f94df093a54dd0ee7d6b2a5cfb08b888530d8db503cd6044354e86a0e4882472566366270cbc560ac8dade065c5d3812ee7386a1f795c405fddbcac9f32d903de8421651248d456e2351912b794153a9a89d11117ca5dfa5bff4b9c51bd9b49388762bee675a77ef09256301f9a8748e87478650f8ade4492b1134f2cfca12dc68dad759ed32ca5e30bd8486412c32294c168a687fc2cf8299eb082137aeda142fe92f0578299fbef0efb1dd3ec317ad0f2bfebbf84d47111d48d2526219ced47465d8df9447a98ac9b19d79a253b614a5e85acdaf8995c9072c78d840ab2a1013cbc2483373ecf43c18ddda24d571a70c7af27ae0a86b5c3986852b2c5fe7392b233
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:5e:d6:9f:50:03:3d:b5:c0:1f:f0:85:82:8d:07:18:14:73:f8:7f]
            modulus: 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
    public exponent: 10001

] 
2022-03-09 04:09:31.788  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:09:31.795 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:09:31.801 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-09 04:09:31.805 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:09:31.807  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-09 04:09:31.809  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:09:31.811  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:09:31.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:09:31.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:09:31.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:09:31.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:09:31.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:09:31.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:09:31.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:09:32.054  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:09:32.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:09:32.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:09:32.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:09:32.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:09:32.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:09:32.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:09:32.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:09:32.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:09:32.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:09:32.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:09:32.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:09:32.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:09:32.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:09:32.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:09:32.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:09:32.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:72:fe:ea:c7:9c:bd:64:e9:8f:ff:65:f2:72:57:af:30:e6:96:5a]
            modulus: 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
    public exponent: 10001

] 
2022-03-09 04:09:46.416  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:09:46.418 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:09:46.420 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-09 04:09:46.423 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:09:46.424  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-09 04:09:46.425  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:09:46.425  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:09:46.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:09:46.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:09:46.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:09:46.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:09:46.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:09:46.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:09:46.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:09:46.597  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:09:46.597  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:09:46.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:09:46.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:09:46.600  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:09:46.601  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:09:46.601 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:09:46.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:09:46.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:09:46.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:09:46.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:09:46.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:09:46.605 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:09:46.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:09:46.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:09:46.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:09:46.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:60:ef:b4:e8:39:8b:d0:cf:ac:cf:c5:a2:cf:7a:c1:a4:a3:8e:5e]
            modulus: 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
    public exponent: 10001

] 
2022-03-09 04:10:19.116  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:10:19.118 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:10:19.120 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-09 04:10:19.120 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:10:19.121  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-09 04:10:19.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:10:19.123  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:10:19.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:10:19.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:10:19.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:10:19.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:10:19.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:10:19.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:10:19.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:10:19.320  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:10:19.321  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:10:19.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:10:19.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:10:19.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:10:19.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:10:19.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:10:19.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:10:19.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:10:19.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:10:19.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:10:19.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:10:19.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:10:19.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:10:19.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:10:19.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:10:19.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:f2:9b:6b:1d:6b:de:58:3f:83:ec:3c:e6:fa:e4:71:0a:bc:df:fb]
            modulus: f8b3af47460d396622ca16f6573666f8f6ee9e044bd4302931414e7e4e12b67b706f05af72ae5a865868432521fb5e52722d641b1f35445d3028d42e02243f17f8d2e0393d6f3b27235f14183bb66efe68c191cc1e7eeca2b6c5df5b35c956cd33a56d5de2be5335f2a1b856d42dc2629ec7764bba2613bbc2460a23771307a8a99d482790d7bc3af9102ff94251c6493fea6bdbbc55dd518a507e85d0986b7e46d3fc362e6b819659f8afa381f40e29772b2080c4dbe9b052b4f110fa6ce1d72fa48209f88a0e5cf812b47874f3e1ed7a4a458a941272c138a62a9425710603c28e0e1f78f835cea83e89e4ca47ec1f10cc2d7a84bd7c1b550b8eb2b3433b57
    public exponent: 10001

] 
2022-03-09 04:10:53.009  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:10:53.012 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:10:53.014 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-09 04:10:53.016 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:10:53.016  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-09 04:10:53.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:10:53.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:10:53.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:10:53.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:10:53.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:10:53.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:10:53.026 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:10:53.026 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:10:53.026 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:10:53.238  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:10:53.239  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:10:53.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:10:53.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:10:53.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:10:53.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:10:53.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:10:53.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:10:53.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:10:53.243 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:10:53.243 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:10:53.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:10:53.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:10:53.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:10:53.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:10:53.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:10:53.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:e4:47:18:47:4f:1c:9e:05:3d:70:96:e2:74:0c:38:0f:4d:da:e3]
            modulus: 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
    public exponent: 10001

] 
2022-03-09 04:12:39.599  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-09 04:12:39.601 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-09 04:12:39.603 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-09 04:12:39.604 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-09 04:12:39.605  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-09 04:12:39.606  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-09 04:12:39.606  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-09 04:12:39.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-09 04:12:39.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-09 04:12:39.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-09 04:12:39.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-09 04:12:39.614 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:12:39.614 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-09 04:12:39.614 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:12:39.788  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-09 04:12:39.789  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-09 04:12:39.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-09 04:12:39.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-09 04:12:39.791  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-09 04:12:39.792  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-09 04:12:39.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:12:39.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:12:39.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:12:39.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:12:39.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:12:39.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:12:39.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-09 04:12:39.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-09 04:12:39.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-09 04:12:39.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-09 04:12:39.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 73255413059826153134776664296619392015385529386
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 09 02:58:42 UTC 2022
           Final Date: Mon Mar 08 02:58:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08
                       8078ba7df270bd8da687617eeda821dcf513d6a6
                       f9a7875647bb47f2068df86832488fa8dc363468
                       7181786e5df0e5a6f6d2715d018ecccbe0d22e38
                       9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06
                       9d2c686f5ffa222819f8ce33884d5725ad719cdd
                       46b029e0cd0a00c60497b41e7983ffb71b1c9303
                       d3a98abf46d2b1f51bb8d98272b684c9fabeb054
                       c3431125600c68ed275bf1c788bae9a21c5be68f
                       d4bd62357c21b518cbf8abfe2b3854e61e9d2740
                       a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153
                       9c247b8cdea44edfd6a68c90c1b504c0190c5b15
                       291828e9c774f918a131190fe190c87a7a49d473
                       355b3785c5528d8d790173dd3d39e117ee753085
                       2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e
                       5444ee7442213b29468315e3cada81d0bbcf5b6e
                       0cccbc42469a511a3e4d55c3bb0bd6a969a4923b
                       a42c1808e3d66f6c64cefeb6cc6c0e7085a77819
                       c73516b3cfada5749d430689aa5f5765d23af7b2
                       23902453
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:b8:d3:e7:b9:52:b1:29:01:37:9a:33:5a:9f:ca:8e:07:cb:2d:b1]
            modulus: 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
    public exponent: 10001

]