Results

By type

          2022-03-15 14:58:29,501 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-15 14:58:31,408 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-15 14:58:32.578  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 15, 2022 2:58:34 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 15, 2022 2:58:34 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 15, 2022 2:58:34 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 15, 2022 2:58:35 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-15 14:58:35.789 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-15 14:58:36.145  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-15 14:58:36.334  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-15 14:58:37.345 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-15 14:58:37.349 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-15 14:58:37.350 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-15 14:58:37.355 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-15 14:58:37.406 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-03-15 14:58:37.411 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-15 14:58:37.553 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-15 14:58:38.533 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 15, 2022 2:58:39 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-15 14:58:39.821  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 11.705 seconds (JVM running for 14.669)
Mar 15, 2022 2:59:00 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-15 16:01:09.362  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:01:09.385 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:01:09.447 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 16:01:09.454 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:01:09.495  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 16:01:09.499  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:01:09.501  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:01:09.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:01:09.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:01:09.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:01:09.518 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:01:09.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:01:09.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:01:09.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:01:09.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:01:09.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:01:10.612  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:01:10.616  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:01:10.616 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:01:10.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:01:10.628  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:01:10.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:01:10.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:01:10.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:01:10.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:01:10.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:01:10.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:01:10.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:01:10.653 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:01:10.653 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:01:10.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:01:10.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:01:10.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: d0d3b3062708f88d2bb664150425261e74b116c48a0a74a63641e7f21babeae6183f19aaf21852808f0617d8bf4b2be1bb80ff8a6b37e38ab0b2f8523b0d741a8bd5331e143dfa8b2b4e625add186de70a6ea9e2b38d04d9a913a1f8297e3207f8f2a4854de9d3c1a37a7ff02f0c5e016bf11acd138981cf3b454f6e773db9a390b4e0dcafab570e6a604bf72a50e8e6ad913f0cdcc3350d448a9ac4a090857c5de2b007fd9f4ab2fd30ca2aa049a036a34c0c1fe8505fd693c7d81b568bc2e8ff3c894ddff55486a9b9f45b4ab0f185487da7dd08c18554c572fc82c71942ff3cf20a4a0f028ef84ebf7bbc9ac3c1a9487e8c088964c59d62c3ca58267f96b795b7c16aa66c2c047b3e08f9e4bc3a77bb1d9eaecac505b396580500bf48977e4bd17fea52c857effa3a220a9b134f5d3638fac954f8203d77833803cc7b555f1e4d93979f3dbd93911a3faee4aa2b964fd5754ef8e52347b078cbdf7a608cbae1baaccdb0c68719e9cf4deb5336f5e26ae42b0bf4c73f8c65083ed99d07f001
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:5e:ce:8f:38:9b:74:b3:bf:2f:44:0b:7a:98:a6:d4:5b:f7:9d:84]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:02:54.563  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:02:54.565 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:02:54.566 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:02:54.569 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:02:54.569  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:02:54.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:02:54.572  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:02:54.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:02:54.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:02:54.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:02:54.600 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:02:54.603 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:02:54.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:02:54.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:02:54.852  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:02:54.853  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:02:54.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:02:54.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:02:54.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:02:54.868  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:02:54.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:02:54.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:02:54.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:02:54.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:02:54.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:02:54.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:02:54.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:02:54.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:02:54.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:02:54.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:02:54.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:56:22:d7:51:72:49:53:d3:0e:ea:09:a6:4c:cd:0d:dc:3a:58:2c]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:04:41.659  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:04:41.660 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:04:41.663 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 16:04:41.665 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:04:41.665  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 16:04:41.666  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:04:41.667  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:04:41.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:04:41.668 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:04:41.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:04:41.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:04:41.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:04:41.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:04:41.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:04:42.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:04:42.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:04:42.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:04:42.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:04:42.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:04:42.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:04:42.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:04:42.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:04:42.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:04:42.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:04:42.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:04:42.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:04:42.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:04:42.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:04:42.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:04:42.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:04:42.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:65:58:d8:3d:e6:2c:94:84:47:d6:e4:22:d4:97:3b:47:bf:6d:33]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:05:50.454  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:05:50.456 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:05:50.458 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:05:50.465 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:05:50.466  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:05:50.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:05:50.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:05:50.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:05:50.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:05:50.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:05:50.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:05:50.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:05:50.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:05:50.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:05:50.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:05:50.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:05:50.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:05:50.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:05:50.830  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:05:50.830  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:05:50.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:05:50.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:05:50.837 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:05:50.837 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:05:50.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:05:50.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:05:50.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:05:50.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:05:50.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:05:50.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:05:50.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:ca:77:25:66:2a:b7:06:ed:1b:f0:af:89:ac:59:93:a3:a5:56:77]
            modulus: b129c26f0a1ca3bc9521e989567ab4ed24a3a768c241d7a5797d304cafd604c1c85115a5dab133299e6a24db038f1c4a3c6bf3b939cc9b54e145b218c63ac532b4cb8526d39f97d90890aca7342810fbcf181b1163664dc2bd6088903d13e1f7b3cbb5c7e83b859fce345ff475dffeb61717ef49c6a603ca52f2631c13cee62036d5dfb252324c142f23ecae53531a8e4f3fc61e2f944ae6ea55293a0041f762e11773605ed1412fbcd5dac76a01e29c6699690f4c21d0b2eac24cfcd610a9c8d7c7e5ab88b70f228fe63135effab3f3394c38910780395cc6b8313001b9d8550a110696a8a73fb7e371c037105e059f89dec1c8fbdb5cc0bf78e5f40e31d8d1
    public exponent: 10001

] 
2022-03-15 16:06:21.903  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:06:21.905 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:06:21.906 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-15 16:06:21.907 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:06:21.908  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-15 16:06:21.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:06:21.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:06:21.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:06:21.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:06:21.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:06:21.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:06:21.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:06:21.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:06:21.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:06:22.201  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:06:22.202  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:06:22.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:06:22.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:06:22.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:06:22.208  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:06:22.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:06:22.210 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:06:22.210 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:06:22.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:06:22.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:06:22.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:06:22.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:06:22.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:06:22.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:06:22.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:06:22.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: d0d3b3062708f88d2bb664150425261e74b116c48a0a74a63641e7f21babeae6183f19aaf21852808f0617d8bf4b2be1bb80ff8a6b37e38ab0b2f8523b0d741a8bd5331e143dfa8b2b4e625add186de70a6ea9e2b38d04d9a913a1f8297e3207f8f2a4854de9d3c1a37a7ff02f0c5e016bf11acd138981cf3b454f6e773db9a390b4e0dcafab570e6a604bf72a50e8e6ad913f0cdcc3350d448a9ac4a090857c5de2b007fd9f4ab2fd30ca2aa049a036a34c0c1fe8505fd693c7d81b568bc2e8ff3c894ddff55486a9b9f45b4ab0f185487da7dd08c18554c572fc82c71942ff3cf20a4a0f028ef84ebf7bbc9ac3c1a9487e8c088964c59d62c3ca58267f96b795b7c16aa66c2c047b3e08f9e4bc3a77bb1d9eaecac505b396580500bf48977e4bd17fea52c857effa3a220a9b134f5d3638fac954f8203d77833803cc7b555f1e4d93979f3dbd93911a3faee4aa2b964fd5754ef8e52347b078cbdf7a608cbae1baaccdb0c68719e9cf4deb5336f5e26ae42b0bf4c73f8c65083ed99d07f001
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:63:6e:b5:de:a7:1e:a7:28:46:2f:84:c7:de:86:de:8a:8d:c7:c6]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:06:55.302  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:06:55.303 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:06:55.306 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-15 16:06:55.307 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:06:55.307  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-15 16:06:55.311  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:06:55.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:06:55.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:06:55.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:06:55.316 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:06:55.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:06:55.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:06:55.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:06:55.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:06:55.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:06:55.531  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:06:55.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:06:55.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:06:55.536  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:06:55.537  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:06:55.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:06:55.539 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:06:55.539 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:06:55.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:06:55.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:06:55.542 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:06:55.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:06:55.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:06:55.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:06:55.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:06:55.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:cb:72:a8:3e:f8:c3:bd:b8:35:3b:f5:59:79:00:98:e0:1e:38:87]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:08:08.916  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:08:08.917 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:08:08.919 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:08:08.919 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:08:08.920  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:08:08.920  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:08:08.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:08:08.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:08:08.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:08:08.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:08:08.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:08:08.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:08:08.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:08:08.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:08:09.139  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:08:09.140  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:08:09.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:08:09.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:08:09.142  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:08:09.143  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:08:09.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:08:09.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:08:09.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:08:09.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:08:09.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:08:09.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:08:09.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:08:09.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:08:09.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:08:09.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:08:09.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:6f:2f:15:8a:3f:7e:6c:f0:d2:88:3b:33:3c:b6:8f:41:e9:11:f2]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:08:40.778  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:08:40.781 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:08:40.795 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:08:40.798 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:08:40.799  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:08:40.800  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:08:40.800  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:08:40.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:08:40.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:08:40.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:08:40.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:08:40.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:08:40.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:08:40.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:08:41.088  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:08:41.089  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:08:41.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:08:41.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:08:41.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:08:41.092  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:08:41.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:08:41.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:08:41.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:08:41.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:08:41.102 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:08:41.102 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:08:41.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:08:41.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:08:41.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:08:41.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:08:41.112 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:c2:3b:24:c4:54:45:f3:e9:1b:ea:87:9a:17:04:d8:af:b4:e5:8b]
            modulus: c2b524bc52cecfe7a7bab2941270d412566acd240479432f4f922e9d9712f5c8bc3594122fb7939e9ce32b2de8e3a718e48a92ce781f7c6ff3e40827ad9adf444092c3c920d8af693a7cfd1cffe6ae91e1af899702dd0b8dfcdc9b71f4a2e614c06784ee7531b0522df8a51e2136ac8414bbaab41422ffe3b93bbdd0f914af42ed12e54c775427a80e42634179871740396da8b4baf3bf466db181981ce8c7fba51703440f4be70b1f59ca620b9735046d8a7331d3bc586320844a28527b9ed37e0203b0d978bc5ff7ed2bbb44cca126e330e63c38ca388cd69848ac8b2c2ca3bbea396bcc3299fe0fc0b71053b6cc28c624684c67aa19d3e2c73b7a8b6c7917
    public exponent: 10001

] 
2022-03-15 16:10:00.243  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:10:00.244 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:10:00.247 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:10:00.248 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:10:00.248  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:10:00.249  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:10:00.249  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:10:00.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:10:00.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:10:00.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:10:00.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:10:00.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:10:00.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:10:00.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:10:00.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:10:00.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:10:00.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:10:00.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:10:00.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:10:00.481  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:10:00.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:10:00.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:10:00.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:10:00.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:10:00.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:10:00.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:10:00.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:10:00.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:10:00.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:10:00.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:10:00.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:2f:8b:9b:88:96:3f:58:dd:bf:61:f5:e7:71:94:24:7e:36:75:82]
            modulus: ae6704677833c6e11b15809cff1d8dc9fcc200e03c9423ce91794bb9950fd8f0978c45d3d9c0c0842e41d747f6693565ecf4900d6447fb71a2a39e57944abd1a907c74b8e9e74a112099f982239e1fba9a5597e05ca31d8f06935bbd5d4a0ddb05a2b8811b45fbf99433d8107f5b15e25fc3804ea09b18ce0eb5c3e2e2cb02447906b0117c4ab41d537d685790d6c71cbe21468908dcef9e71a28f7f2387e15b537f71850931f4c0d13a6fec2cbed79419dbe12423fe98ca4d463c9f0e3f0b9e61edd668f71d8aa5b3417e743d440d95af0e97512946f0c414be780c06b97bd5fe7bb9fa7c6d2b30947f50464b16ebafdd9a9883dc4ea95feedac9f633c5ed2b
    public exponent: 10001

] 
2022-03-15 16:10:58.911  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:10:58.912 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:10:58.914 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:10:58.915 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:10:58.915  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:10:58.916  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:10:58.916  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:10:58.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:10:58.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:10:58.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:10:58.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:10:58.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:10:58.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:10:58.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:10:59.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:10:59.204  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:10:59.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:10:59.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:10:59.217  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:10:59.218  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:10:59.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:10:59.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:10:59.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:10:59.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:10:59.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:10:59.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:10:59.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:10:59.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:10:59.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:10:59.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:10:59.236 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: d0d3b3062708f88d2bb664150425261e74b116c48a0a74a63641e7f21babeae6183f19aaf21852808f0617d8bf4b2be1bb80ff8a6b37e38ab0b2f8523b0d741a8bd5331e143dfa8b2b4e625add186de70a6ea9e2b38d04d9a913a1f8297e3207f8f2a4854de9d3c1a37a7ff02f0c5e016bf11acd138981cf3b454f6e773db9a390b4e0dcafab570e6a604bf72a50e8e6ad913f0cdcc3350d448a9ac4a090857c5de2b007fd9f4ab2fd30ca2aa049a036a34c0c1fe8505fd693c7d81b568bc2e8ff3c894ddff55486a9b9f45b4ab0f185487da7dd08c18554c572fc82c71942ff3cf20a4a0f028ef84ebf7bbc9ac3c1a9487e8c088964c59d62c3ca58267f96b795b7c16aa66c2c047b3e08f9e4bc3a77bb1d9eaecac505b396580500bf48977e4bd17fea52c857effa3a220a9b134f5d3638fac954f8203d77833803cc7b555f1e4d93979f3dbd93911a3faee4aa2b964fd5754ef8e52347b078cbdf7a608cbae1baaccdb0c68719e9cf4deb5336f5e26ae42b0bf4c73f8c65083ed99d07f001
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:e3:ae:fd:6d:21:65:e2:57:36:08:7e:37:32:db:ac:d4:73:1d:7e]
            modulus: d595e32b1c68e80f28ecfa0a1dfde3c20a621b2aa37e01ef140e5e30561af79b96da01f54f18cbf0cc99f86f6218683e3a55008571a49685a701f280b017b6897714cbdfcb647d0d99e9c93e011601d8b4655537577b9fc4198a537c0b9a4b7e58ee301f23a9d0706dc7113597c348c766651f60273b6f0b126d66f7dd0f5b8dcb87c542bd21596dc5266ffaa71e95d4a1839cbbae1e929c2ff36f1501df04d2cf0b4646ae449ee284bea35822b6ca4088b9aad35a584473849ded46e42511456140048d8f0a23d704a2d2ea1044f80b266daff83e7882df09ca7ceb0d6d1b35adbe5e96c566083575b053fe170f347b3bbd727e8ec734bda54502f3d08c1095
    public exponent: 10001

] 
2022-03-15 16:11:33.272  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:11:33.273 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:11:33.274 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 16:11:33.276 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:11:33.276  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 16:11:33.277  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:11:33.277  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:11:33.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:11:33.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:11:33.279 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:11:33.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:11:33.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:11:33.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:11:33.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:11:33.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:11:33.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:11:33.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:11:33.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:11:33.457  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:11:33.457  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:11:33.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:11:33.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:11:33.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:11:33.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:11:33.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:11:33.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:11:33.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:11:33.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:11:33.463 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:11:33.464 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:11:33.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:e6:25:57:d4:fa:c2:9e:19:3e:36:14:78:12:45:83:da:20:60:60]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:14:30.023  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:14:30.025 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:14:30.026 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:14:30.027 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:14:30.028  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 16:14:30.028  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:14:30.029  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:14:30.029 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:14:30.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:14:30.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:14:30.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:14:30.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:14:30.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:14:30.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:14:30.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:14:30.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:14:30.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:14:30.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:14:30.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:14:30.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:14:30.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:14:30.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:14:30.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:14:30.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:14:30.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:14:30.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:14:30.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:14:30.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:14:30.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:14:30.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:14:30.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:8f:d6:b6:d1:9f:81:fd:e0:3a:65:53:c3:e8:fb:fa:92:05:e2:f6]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:15:42.580  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:15:42.583 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:15:42.585 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:15:42.586 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:15:42.586  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 16:15:42.587  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:15:42.588  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:15:42.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:15:42.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:15:42.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:15:42.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:15:42.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:15:42.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:15:42.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:15:42.808  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:15:42.809  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:15:42.809 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:15:42.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:15:42.811  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:15:42.812  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:15:42.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:15:42.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:15:42.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:15:42.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:15:42.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:15:42.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:15:42.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:15:42.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:15:42.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:15:42.816 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:15:42.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: d0d3b3062708f88d2bb664150425261e74b116c48a0a74a63641e7f21babeae6183f19aaf21852808f0617d8bf4b2be1bb80ff8a6b37e38ab0b2f8523b0d741a8bd5331e143dfa8b2b4e625add186de70a6ea9e2b38d04d9a913a1f8297e3207f8f2a4854de9d3c1a37a7ff02f0c5e016bf11acd138981cf3b454f6e773db9a390b4e0dcafab570e6a604bf72a50e8e6ad913f0cdcc3350d448a9ac4a090857c5de2b007fd9f4ab2fd30ca2aa049a036a34c0c1fe8505fd693c7d81b568bc2e8ff3c894ddff55486a9b9f45b4ab0f185487da7dd08c18554c572fc82c71942ff3cf20a4a0f028ef84ebf7bbc9ac3c1a9487e8c088964c59d62c3ca58267f96b795b7c16aa66c2c047b3e08f9e4bc3a77bb1d9eaecac505b396580500bf48977e4bd17fea52c857effa3a220a9b134f5d3638fac954f8203d77833803cc7b555f1e4d93979f3dbd93911a3faee4aa2b964fd5754ef8e52347b078cbdf7a608cbae1baaccdb0c68719e9cf4deb5336f5e26ae42b0bf4c73f8c65083ed99d07f001
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:93:b0:d9:80:23:71:dd:71:c1:7d:a2:ce:e0:07:fa:b4:c3:bf:0d]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 16:17:16.737  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 16:17:16.739 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 16:17:16.741 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 16:17:16.741 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 16:17:16.742  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 16:17:16.742  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 16:17:16.743  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 16:17:16.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 16:17:16.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 16:17:16.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 16:17:16.749 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 16:17:16.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:17:16.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 16:17:16.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:17:17.012  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 16:17:17.012  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 16:17:17.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 16:17:17.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 16:17:17.014  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 16:17:17.015  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 16:17:17.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:17:17.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:17:17.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:17:17.016 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:17:17.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:17:17.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:17:17.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 16:17:17.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 16:17:17.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 16:17:17.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 16:17:17.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 11466087993888127043318645708126516680056064635
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 14:32:19 UTC 2022
           Final Date: Sun Mar 14 14:32:18 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:15:cb:88:c5:85:9f:d9:80:8e:2a:75:1d:56:b1:64:45:39:09:68]
            modulus: d0d3b3062708f88d2bb664150425261e74b116c48a0a74a63641e7f21babeae6183f19aaf21852808f0617d8bf4b2be1bb80ff8a6b37e38ab0b2f8523b0d741a8bd5331e143dfa8b2b4e625add186de70a6ea9e2b38d04d9a913a1f8297e3207f8f2a4854de9d3c1a37a7ff02f0c5e016bf11acd138981cf3b454f6e773db9a390b4e0dcafab570e6a604bf72a50e8e6ad913f0cdcc3350d448a9ac4a090857c5de2b007fd9f4ab2fd30ca2aa049a036a34c0c1fe8505fd693c7d81b568bc2e8ff3c894ddff55486a9b9f45b4ab0f185487da7dd08c18554c572fc82c71942ff3cf20a4a0f028ef84ebf7bbc9ac3c1a9487e8c088964c59d62c3ca58267f96b795b7c16aa66c2c047b3e08f9e4bc3a77bb1d9eaecac505b396580500bf48977e4bd17fea52c857effa3a220a9b134f5d3638fac954f8203d77833803cc7b555f1e4d93979f3dbd93911a3faee4aa2b964fd5754ef8e52347b078cbdf7a608cbae1baaccdb0c68719e9cf4deb5336f5e26ae42b0bf4c73f8c65083ed99d07f001
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 208810381d742ebcba4f1ba93b1d9425279a9f0e
                       ea367b713cb70101d79fc3c08902fe70869bda06
                       e5d96086906acb5ef56ac1645c00e254d71537d2
                       525f34ce54fd128a7cf8f1aee2714359167f45e1
                       f398cf8be24b3892b6c9df014d572726d952d165
                       e39e83fa6c21f965e3331a752e911c2d6ce8a98c
                       2e52ec47875329bbcb502b5815daa4ff987452a0
                       2d9bde45a8afaa8cfa3990142f0f2a4c6da31373
                       a2441a71028fdc0f367c357240ba1f8949deb34f
                       ab1dc71da914efe68c2a8036f876827aafa7911a
                       b74762a2d205c2b375ed054b4606a2b74c7f0aa5
                       076304015282a4a62ddd21a70a83a51b40883a64
                       4373d2215742eb3bfda30183b9084e74a01b6316
                       6fb41737e9f41d934f7b5c23ece3960d7b683680
                       aeedcc46bc80fa6e3a3275e492cc4045d5a605bc
                       d7690e6b579a63f590984f6aae1b325cf66331ae
                       4ee7f8635c054882c07d001fccbc072167836292
                       fc2921163a8a507044734c02dc559ec5154b9aec
                       0f89ca20717858f8fe6a0b33da0bba51638cc163
                       7443ed59
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:85:f5:42:b8:76:62:58:f8:bc:c9:d1:e4:83:3c:ae:cc:67:55:9b]
            modulus: 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
    public exponent: 10001

]