Results

By type

          2022-03-22 10:45:54,087 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-22 10:45:55,245 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-22 10:45:56.078  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 22, 2022 10:45:58 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 22, 2022 10:45:58 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 22, 2022 10:45:58 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 22, 2022 10:45:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-22 10:45:58.985 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-22 10:45:59.296  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-22 10:45:59.510  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-22 10:46:00.332 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-22 10:46:00.338 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-22 10:46:00.340 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-22 10:46:00.344 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-22 10:46:00.388 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-22 10:46:00.392 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-22 10:46:00.517 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-22 10:46:01.115 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 22, 2022 10:46:01 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-22 10:46:02.025  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.843 seconds (JVM running for 10.828)
Mar 22, 2022 10:46:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-22 10:47:46.565  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 10:47:46.577 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 10:47:46.643 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-22 10:47:46.650 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 10:47:46.673  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-22 10:47:46.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 10:47:46.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 10:47:46.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 10:47:46.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 10:47:46.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 10:47:46.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 10:47:46.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 10:47:46.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 10:47:46.751 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 10:47:46.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 10:47:46.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 10:47:47.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 10:47:47.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 10:47:47.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 10:47:47.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 10:47:47.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 10:47:47.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 10:47:47.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 10:47:47.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 10:47:47.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 10:47:47.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 10:47:47.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 10:47:47.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 10:47:47.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 10:47:47.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 10:47:47.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 10:47:47.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 10:47:47.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:b4:ae:90:a4:8d:c8:d0:3e:de:a2:eb:bb:c1:b2:4c:eb:43:03:0f]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:16:13.947  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:16:13.951 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:16:13.955 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-22 12:16:13.957 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:16:13.957  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-22 12:16:13.958  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:16:13.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:16:13.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:16:13.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:16:13.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:16:13.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:16:13.969 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:16:13.969 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:16:13.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:16:14.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:16:14.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:16:14.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:16:14.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:16:14.156  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:16:14.156  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:16:14.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:16:14.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:16:14.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:16:14.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:16:14.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:16:14.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:16:14.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:16:14.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:16:14.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:16:14.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:16:14.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:61:bb:7c:02:0d:08:19:0f:e6:aa:ed:9b:bc:18:5b:41:f2:9e:60]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:17:07.433  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:17:07.435 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:17:07.437 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-22 12:17:07.439 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:17:07.439  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-22 12:17:07.440  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:17:07.441  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:17:07.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:17:07.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:17:07.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:17:07.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:17:07.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:17:07.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:17:07.458 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:17:07.676  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:17:07.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:17:07.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:17:07.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:17:07.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:17:07.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:17:07.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:17:07.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:17:07.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:17:07.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:17:07.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:17:07.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:17:07.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:17:07.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:17:07.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:17:07.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:17:07.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:82:52:d9:54:3f:ce:2e:91:8b:3b:66:c1:eb:28:80:e1:89:9d:cf]
            modulus: c0b051e0c99f6ce98050bd5e28cf14fe187b4c9371a503b87a86dbe50a8e5732ed3b72b55b4b1d57d6300907ad9a5789edfa56122d18a0ac0527ce82f563b7312675651160fb401db6c4eb71aa0013afb4ce891bbac43ccd68e85ba8588ca206c58f5397f9e859c01b5401fb0a108746f0050989ecea4936ef655e48fd2a87d2bbdbb78ce5aa9a62efb60b4804bce3230eb2e06770b65d28089bcad536393d6801ab61914d379c17633bd7677eee1c5e40109667d6d979d4239d277fe0941f6c07b41db956fc2a94008ecb1e26a599cffbb01c0ff2d2654a9e64192f4661d6f2054ea07260891c876c788a50ff8c88df16f78893ce1b9758cf84299eb82de46b
    public exponent: 10001

] 
2022-03-22 12:18:43.697  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:18:43.698 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:18:43.699 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-22 12:18:43.700 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:18:43.700  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-22 12:18:43.701  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:18:43.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:18:43.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:18:43.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:18:43.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:18:43.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:18:43.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:18:43.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:18:43.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:18:43.851  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:18:43.852  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:18:43.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:18:43.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:18:43.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:18:43.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:18:43.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:18:43.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:18:43.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:18:43.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:18:43.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:18:43.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:18:43.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:18:43.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:18:43.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:18:43.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:18:43.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:2c:4f:b5:74:e4:5f:d5:29:57:cf:da:73:75:f7:b8:7f:4c:4b:3d]
            modulus: b72ac78ab5cff5dee856128e671492a5ff3995ef7d93f465c1db7868371217a1f4a04c9e259b5f2d1f590c08f62f7e543646a407d22ec3e0c1af0afd0cb343a4162b2de02cb6d4f6c4b7e12cbb1e01cf9d3cb2fcc4f29168864e0408f570ba33afe51c129881d268a5673b70818d97ee0bab583ab11fe819c57e65904cc67c4d25903cf37a40b3027969e6d3c735bd5da80b81676b56d98c9f625cc254002f13e89a37b41bc9cf2aa3c1983209a2fa7db7b73f4fed9015b4a7cc09916a16aeee7af4fd817cc71cc7249729e930f3f6508a0d2f766a2ee3412d988a81a3bbb79851bfcb2dd46979fe9d0810adaab89c342c1a1224c04664328602631151b411bb
    public exponent: 10001

] 
2022-03-22 12:20:57.622  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:20:57.625 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:20:57.627 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-22 12:20:57.629 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:20:57.630  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-22 12:20:57.631  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:20:57.631  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:20:57.632 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:20:57.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:20:57.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:20:57.643 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:20:57.644 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:20:57.645 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:20:57.646 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:20:57.794  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:20:57.795  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:20:57.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:20:57.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:20:57.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:20:57.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:20:57.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:20:57.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:20:57.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:20:57.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:20:57.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:20:57.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:20:57.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:20:57.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:20:57.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:20:57.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:20:57.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:44:c3:58:64:20:c7:cd:87:c7:f9:bd:77:ac:4c:e3:0f:8f:9a:92]
            modulus: cdade23ccf868bd6582fcf71a00441bdf4f6e4d2028e08e9567fb74a343a7a40a9ffaf2c296b0afd70986a2f1bbcf5915bd6b397c048a8c6216b73edc3daf83a4d3371694b1a135ddd7d8617e1aa0ad090f2a53e00783def6c06a5626f0eee04dba1d8f90fff14a21e312c8c3d450331ecfca2b4e53735a5abec8ac0e006c155ad72d1a1d95efb7bb469ec3809fbed2814259d82702d25385ea0d42fee85b9032c004cfa1d134ff2649e95b40e8e62f75c6be7808673a94884d1bcdd402f1822e972ae68b95be23036b078a9c1c3011bf56417b97ffc71cd78259192b4c95f1ced880a0ab72c5e549013d3b4b09b311f2f1f7d69c693a28d9897259200558c41
    public exponent: 10001

] 
2022-03-22 12:20:59.542  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:20:59.544 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:20:59.546 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-22 12:20:59.547 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:20:59.548  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-22 12:20:59.549  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:20:59.549  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:20:59.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:20:59.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:20:59.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:20:59.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:20:59.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:20:59.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:20:59.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:20:59.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:20:59.668  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:20:59.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:20:59.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:20:59.671  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:20:59.671  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:20:59.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:20:59.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:20:59.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:20:59.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:20:59.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:20:59.674 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:20:59.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:20:59.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:20:59.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:20:59.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:20:59.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:6b:3b:d5:da:ba:a8:ee:eb:a9:47:2a:ac:67:79:cb:06:97:98:0d]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:21:36.951  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:21:36.952 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:21:36.953 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-22 12:21:36.954 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:21:36.954  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-22 12:21:36.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:21:36.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:21:36.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:21:36.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:21:36.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:21:36.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:21:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:21:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:21:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:21:37.089  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:21:37.090  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:21:37.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:21:37.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:21:37.093  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:21:37.093  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:21:37.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:21:37.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:21:37.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:21:37.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:21:37.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:21:37.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:21:37.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:21:37.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:21:37.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:21:37.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:21:37.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [19:e7:66:80:88:07:73:76:8f:d7:48:d5:b3:ff:67:e8:fa:e8:3f:44]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:22:16.507  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:22:16.509 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:22:16.510 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-22 12:22:16.511 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:22:16.511  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-22 12:22:16.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:22:16.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:22:16.513 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:22:16.514 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:22:16.514 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:22:16.519 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:22:16.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:22:16.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:22:16.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:22:16.645  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:22:16.646  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:22:16.647 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:22:16.647 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:22:16.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:22:16.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:22:16.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:22:16.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:22:16.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:22:16.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:22:16.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:22:16.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:22:16.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:22:16.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:22:16.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:22:16.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:22:16.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:13:95:b2:91:12:74:b9:25:dc:96:55:0f:ba:a7:20:2c:43:e7:67]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:24:19.269  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:24:19.270 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:24:19.272 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-22 12:24:19.273 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:24:19.273  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-22 12:24:19.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:24:19.275  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:24:19.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:24:19.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:24:19.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:24:19.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:24:19.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:24:19.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:24:19.285 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:24:19.458  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:24:19.459  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:24:19.459 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:24:19.460 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:24:19.461  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:24:19.462  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:24:19.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:24:19.463 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:24:19.463 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:24:19.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:24:19.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:24:19.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:24:19.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:24:19.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:24:19.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:24:19.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:24:19.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:92:40:8b:b9:a0:a4:42:3a:0f:c9:20:41:39:85:59:94:76:53:35]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:37:30.813  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:37:30.817 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:37:30.820 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-22 12:37:30.822 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:37:30.823  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-22 12:37:30.824  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:37:30.826  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:37:30.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:37:30.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:37:30.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:37:30.841 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:37:30.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:37:30.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:37:30.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:37:31.046  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:37:31.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:37:31.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:37:31.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:37:31.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:37:31.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:37:31.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:37:31.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:37:31.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:37:31.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:37:31.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:37:31.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:37:31.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:37:31.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:37:31.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:37:31.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:37:31.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 9b21346d14d5a197c00a811aae3fb6433157be51474b11cea20d092c1f6923a2ecb971d4312e57ccd6cacdf647bd6e21e8a757a1fed1d9a98b24b4644a1ad6d059ffb33e3ab7090baa6a26049679825ff30922e2756289d2a3579fe80983099a4dcbc54c82f35387c0b4918873b2f5ae794eb43f8532187ddc69a144197ce48128e83d7bbfef860b7a6ea4e22433011582c082e80d15df22b25bb1294853b8a65e9b1beff0e472f1eced8d0f27a27e79eda9a3fa172868af41e6e597482b212636bc59929113ea940a6c73952c8102f209b71af5d504e4d6e50d463d00754578b41da5a800583306848c791275840a92b1dab3ce7eb61c2b4466929f4c26a90bc9274f1433f869f143ec572c61346c08c09b88d7c04f76b3d9d676e9cb1cd792d4cc11df7525533164dd10162455605bf1be5f7b0a82bc28c1ebcda7504e064cd68e15ada805179dd564b5ecc10abe36b85e6afea6ed855d30f703a8c15bf75dea9991fe060c7e2b150e18be5728b774d25902658d4e0079a838851424939d9f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:28:bf:41:82:71:cd:39:1d:eb:34:a5:5e:7f:92:55:a1:7d:dd:2b]
            modulus: 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
    public exponent: 10001

] 
2022-03-22 12:47:35.933  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-22 12:47:35.935 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-22 12:47:35.937 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-22 12:47:35.938 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-22 12:47:35.939  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-22 12:47:35.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-22 12:47:35.940  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-22 12:47:35.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-22 12:47:35.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-22 12:47:35.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-22 12:47:35.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-22 12:47:35.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:47:35.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-22 12:47:35.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:47:36.103  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-22 12:47:36.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-22 12:47:36.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-22 12:47:36.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-22 12:47:36.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-22 12:47:36.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-22 12:47:36.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:47:36.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:47:36.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:47:36.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:47:36.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:47:36.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:47:36.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-22 12:47:36.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-22 12:47:36.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-22 12:47:36.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-22 12:47:36.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 186744764572681513527772251597524814506431768704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 22 10:43:28 UTC 2022
           Final Date: Sun Mar 21 10:43:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c
                       d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e
                       3955d2ffb13210ac6fe97c52e9b434323a606af3
                       aa0e31e55fdbd899c028f63f25e6914d5fd539c6
                       55bb6dd89c11aaa32965012beb41fb2ab980c184
                       e5ae0c6116cb201930de3df54f77adc1eb755757
                       5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1
                       1832da7c69adcf376705d022cdd43993530a8e4d
                       ff430fe5836faaf5769a9a4943706c4d3a022b2f
                       46ca1e2599655f75ca8ff2777e108cef8754421a
                       f2c61c2557e359383985f6e389a34761f018c61e
                       0d6123bed854929d967db540011f770482b69a1e
                       946d0e96970ff6875b6ff77784a99332b3972a50
                       e3dd01fae68747faaacfc32e6c98c2789837035e
                       a0bef3de9f71fc68efda8187ab0e31471c8ef14a
                       9ee0e45ed280ae6849afce26b911a40bbf8f6c92
                       8d284e80ca1b564f3d12f543c5bf940a2897334b
                       71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d
                       066c2e80b164e412c359aa7e90e9b4c7a9320cdd
                       46c8ca0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:8c:a6:5f:84:5b:f4:4f:81:6b:27:81:7f:0f:59:fe:db:68:c1:08]
            modulus: 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
    public exponent: 10001

]