Results

By type

          2022-03-25 02:59:44,054 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-25 02:59:45,586 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-25 02:59:46.682  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 25, 2022 2:59:49 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 25, 2022 2:59:49 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 25, 2022 2:59:49 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 25, 2022 2:59:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-25 02:59:50.633 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-25 02:59:51.026  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-25 02:59:51.279  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-25 02:59:52.426 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-25 02:59:52.432 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-25 02:59:52.435 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-25 02:59:52.444 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-25 02:59:52.511 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-25 02:59:52.517 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-25 02:59:52.718 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-25 02:59:53.687 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 25, 2022 2:59:54 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-25 02:59:55.362  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.521 seconds (JVM running for 15.804)
Mar 25, 2022 3:00:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-25 03:00:24.292  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 03:00:24.301 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 03:00:24.342 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-25 03:00:24.348 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 03:00:24.368  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-25 03:00:24.371  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 03:00:24.372  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 03:00:24.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 03:00:24.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 03:00:24.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 03:00:24.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 03:00:24.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 03:00:24.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 03:00:24.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 03:00:24.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 03:00:24.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 03:00:25.160  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 03:00:25.164  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 03:00:25.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 03:00:25.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 03:00:25.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 03:00:25.179  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 03:00:25.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 03:00:25.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 03:00:25.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 03:00:25.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 03:00:25.194 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 03:00:25.194 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 03:00:25.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 03:00:25.201 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 03:00:25.201 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 03:00:25.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 03:00:25.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:93:e4:75:ec:3a:22:6d:f5:a4:03:71:e7:c0:80:32:cf:39:5c:4f]
            modulus: bc4eea4071e43a326223b190d6ef1d4d589eef43376791a50c6274c1b37b661d44954cd0ecbf88776a09048113aed641dece7a0bd6f6ee3c152007d7b5ab6b6d8baf0d015a1ca86acb7fcd2279a836aec896cc22cb1cdd39af647d47252849d2daf996b8767d45e4d6991c746fe8b79b081138cdc422f66d481c79a4df76ceff52bf0966481eb06af766a512241df04b8754a609cf31548f7b1e69c2ff0227c98e56d2c7681aaa8f907fe7858daade70795d75796806eb17fd469260e0121db218277d99d60004be96be681e78dd9828c836cf94ee15cfcdb75486b5d30bcb7bc2cec1634547b64d7bd86eb7feb48dd57ee1dd77a9d67fda462491111d4fc0c5
    public exponent: 10001

] 
2022-03-25 04:02:56.313  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:02:56.316 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:02:56.320 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:02:56.321 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:02:56.322  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:02:56.323  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:02:56.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:02:56.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:02:56.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:02:56.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:02:56.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:02:56.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:02:56.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:02:56.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:02:56.533  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:02:56.535  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:02:56.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:02:56.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:02:56.542  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:02:56.543  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:02:56.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:02:56.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:02:56.547 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:02:56.549 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:02:56.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:02:56.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:02:56.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:02:56.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:02:56.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:02:56.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:02:56.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:f1:9a:81:c9:ad:22:63:05:5b:25:d1:ff:d7:08:74:7d:c0:64:95]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:03:41.828  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:03:41.830 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:03:41.832 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-25 04:03:41.833 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:03:41.834  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-25 04:03:41.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:03:41.836  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:03:41.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:03:41.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:03:41.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:03:41.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:03:41.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:03:41.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:03:41.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:03:42.071  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:03:42.072  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:03:42.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:03:42.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:03:42.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:03:42.077  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:03:42.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:03:42.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:03:42.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:03:42.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:03:42.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:03:42.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:03:42.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:03:42.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:03:42.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:03:42.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:03:42.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:32:c3:67:53:d0:ba:2c:f5:42:1f:4e:02:e5:d9:3c:4d:e0:12:31]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:04:29.855  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:04:29.856 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:04:29.858 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:04:29.859 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:04:29.859  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:04:29.860  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:04:29.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:04:29.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:04:29.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:04:29.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:04:29.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:04:29.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:04:29.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:04:29.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:04:30.079  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:04:30.081  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:04:30.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:04:30.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:04:30.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:04:30.085  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:04:30.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:04:30.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:04:30.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:04:30.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:04:30.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:04:30.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:04:30.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:04:30.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:04:30.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:04:30.093 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:04:30.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:57:ad:bc:ad:d1:9e:d2:b1:a4:e1:6e:20:ae:80:a1:ec:60:84:57]
            modulus: e5155b24f137926bc56026b581b8d5afb257b25c04acea8d2fbf6c6a5908bb469e9243be6c1544fee52816718afa598563e8ecbf90de5e7072892b3b32648ca6551baf64469743adff8b6773c3544962ec65760fbb4f53c94824dcca2da7d87b58d2e77f80bee8752267deed5044f57971b5069f0a4e95428592b23ff0b1ec6e4deb852022c4e81dc4a7987dce57cb8c82b8945dd5cbdd54916619583b42d36440f3a87a60fd8be7d89653516f1a863495120587ce6c87af469bff7d68cb0cb4b72aa1d94516b01587586e844fc96760b9d83717d1bbb40e79a7f106aa15b333855fbec9f22c7632baada36f2630433973ca5ac619b51da0884ee10d26e3765d
    public exponent: 10001

] 
2022-03-25 04:06:23.090  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:06:23.091 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:06:23.093 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-25 04:06:23.094 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:06:23.095  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-25 04:06:23.096  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:06:23.096  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:06:23.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:06:23.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:06:23.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:06:23.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:06:23.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:06:23.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:06:23.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:06:23.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:06:23.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:06:23.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:06:23.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:06:23.276  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:06:23.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:06:23.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:06:23.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:06:23.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:06:23.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:06:23.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:06:23.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:06:23.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:06:23.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:06:23.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:06:23.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:06:23.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:76:5e:ff:94:59:37:cf:c3:27:95:fa:f4:cd:5b:4a:ca:52:02:5c]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:07:59.124  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:07:59.127 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:07:59.129 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:07:59.130 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:07:59.130  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:07:59.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:07:59.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:07:59.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:07:59.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:07:59.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:07:59.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:07:59.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:07:59.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:07:59.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:07:59.280  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:07:59.281  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:07:59.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:07:59.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:07:59.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:07:59.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:07:59.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:07:59.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:07:59.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:07:59.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:07:59.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:07:59.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:07:59.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:07:59.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:07:59.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:07:59.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:07:59.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:23:d2:6a:0a:79:7a:cf:71:2b:2b:34:36:14:c3:63:18:44:59:c6]
            modulus: 9c67b6001bf0f1943c011f386c4e7b3bda50764e9075fc62f75c4128dbb848010dd8d077f5d94152602f5d9ed36ad83390ba0ea33ed22de2308150c14841ad465b6bdfbfd09ade3c669f99e1324422263a27018e3613d616c17a8a640d5ee141a4a2b20d12ddb7a1f07df49f22004ed486752cf29f2be2fcbb6e33f0577c06daf8edd4ad32e7225596f49d3eae518444c95170b47390292c65862f5d38144e5894d8e0902cc12952fe55df4122d6a565103cc9761b3f387ac762230bd2ef018d0f5f391013f3652c3aa07d36bb2ccc1d97c295a787280fd7bacd45ffcafac74138358aa8b4b2e0e35e6f5cf301862eeef83c5eaca38e958641279a66f82a4c39
    public exponent: 10001

] 
2022-03-25 04:08:29.218  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:08:29.219 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:08:29.220 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-25 04:08:29.221 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:08:29.222  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-25 04:08:29.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:08:29.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:08:29.224 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:08:29.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:08:29.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:08:29.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:08:29.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:08:29.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:08:29.232 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:08:29.381  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:08:29.381  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:08:29.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:08:29.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:08:29.385  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:08:29.386  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:08:29.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:08:29.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:08:29.389 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:08:29.391 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:08:29.391 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:08:29.392 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:08:29.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:08:29.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:08:29.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:08:29.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:08:29.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:20:09:f4:92:64:c5:f2:0b:a0:fe:bb:34:9e:4e:3c:3b:5a:e9:a2]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:09:04.031  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:09:04.032 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:09:04.034 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-25 04:09:04.035 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:09:04.036  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-25 04:09:04.036  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:09:04.037  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:09:04.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:09:04.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:09:04.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:09:04.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:09:04.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:09:04.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:09:04.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:09:04.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:09:04.205  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:09:04.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:09:04.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:09:04.207  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:09:04.209  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:09:04.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:09:04.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:09:04.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:09:04.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:09:04.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:09:04.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:09:04.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:09:04.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:09:04.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:09:04.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:09:04.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:9e:63:94:58:f7:b2:99:e8:31:0d:b6:b3:23:18:17:1c:c0:35:20]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:10:49.670  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:10:49.672 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:10:49.674 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:10:49.675 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:10:49.676  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:10:49.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:10:49.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:10:49.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:10:49.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:10:49.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:10:49.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:10:49.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:10:49.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:10:49.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:10:49.822  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:10:49.824  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:10:49.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:10:49.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:10:49.828  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:10:49.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:10:49.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:49.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:49.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:49.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:49.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:49.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:49.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:49.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:49.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:49.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:10:49.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 466955821443600200816127576198902749015384805500
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:57:10 UTC 2022
           Final Date: Wed Mar 24 02:57:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [67:6d:ee:54:51:88:8f:b3:86:7c:38:42:ce:95:e3:26:14:49:4b:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bc0057d2228626918abc2fb57bc2c265519de65
                       dda26548e0b0f9591fd3a1b3499b838133a01254
                       71c96807c260af7c3ba22274f6521dfb138e57ac
                       0b5d8ec7f4e56bc1ffe1d84ce3e9af447748a81f
                       6c4e1c476605bc0f0f7caa93134a8215afce4638
                       0ae12ad294b857cd76b65a226b4424d5d5cbb8a0
                       2bec9579977f232a05aa33e9ee97949073cf53d3
                       b69f7fb492bb51ae360cb78ac3e44dd2b8258769
                       f5240e3b6fcae023c1804791efae9078c4674a93
                       b9fa26377885452a8650bb0cb535766cb794df2e
                       8a38d0abc19875c1811bb7ae3c8961d5289707ab
                       b810de9bf3453918a5e8f8011cb1f13153171e0b
                       cb704863d5a1c147ab15749b0ebcd33c74ae1764
                       19e08ae2d77251845c08d494bf0c8d36e60d2d50
                       3feb9684465fd3e9adfe65be2cabbfe2a743d326
                       c92fb76d8d3e547ac8e20ce8eec47b9676d905da
                       5dd7dccf38d65f1d2b0287d4ca162d5e6fb674fb
                       4c957db30b227045dfc414a974bacd05cefe3aca
                       6dc005bd0e172176c34b92f788a673a79a4622a9
                       a0549f05
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:08:3e:24:1f:93:26:a9:b8:4f:d0:e7:f9:53:b8:63:38:8d:9a:9f]
            modulus: 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
    public exponent: 10001

]