Results

By type

          2022-03-29 02:56:59,239 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-29 02:57:00,488 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-29 02:57:01.460  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 29, 2022 2:57:03 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 29, 2022 2:57:03 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 29, 2022 2:57:03 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 29, 2022 2:57:03 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-29 02:57:04.083 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-29 02:57:04.363  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-29 02:57:04.533  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-29 02:57:05.205 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-29 02:57:05.208 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-29 02:57:05.210 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-29 02:57:05.213 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-29 02:57:05.252 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-29 02:57:05.255 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-29 02:57:05.398 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-29 02:57:06.062 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 29, 2022 2:57:06 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-29 02:57:07.083  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.75 seconds (JVM running for 10.516)
Mar 29, 2022 2:57:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-29 02:57:41.994  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 02:57:42.002 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 02:57:42.041 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-29 02:57:42.044 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 02:57:42.061  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-29 02:57:42.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 02:57:42.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 02:57:42.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 02:57:42.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 02:57:42.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 02:57:42.075 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 02:57:42.078 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 02:57:42.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 02:57:42.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 02:57:42.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 02:57:42.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 02:57:42.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 02:57:42.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 02:57:42.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 02:57:42.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 02:57:42.778  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 02:57:42.780  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 02:57:42.780 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 02:57:42.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 02:57:42.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 02:57:42.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 02:57:42.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 02:57:42.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 02:57:42.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 02:57:42.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 02:57:42.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 02:57:42.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 02:57:42.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:94:4d:c3:3d:b4:7d:25:9d:57:2d:f4:63:d9:fd:fc:e8:65:c2:cc]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 03:57:36.045  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 03:57:36.048 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 03:57:36.052 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-29 03:57:36.053 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 03:57:36.055  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-29 03:57:36.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 03:57:36.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 03:57:36.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 03:57:36.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 03:57:36.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 03:57:36.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 03:57:36.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 03:57:36.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 03:57:36.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 03:57:36.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 03:57:36.312  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 03:57:36.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 03:57:36.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 03:57:36.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 03:57:36.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 03:57:36.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 03:57:36.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 03:57:36.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 03:57:36.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 03:57:36.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 03:57:36.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 03:57:36.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 03:57:36.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 03:57:36.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 03:57:36.324 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 03:57:36.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:b9:59:10:61:a6:a9:bd:c7:f0:1d:87:e4:fe:56:d3:a1:d3:92:11]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 03:58:38.777  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 03:58:38.780 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 03:58:38.782 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-29 03:58:38.783 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 03:58:38.783  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-29 03:58:38.784  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 03:58:38.785  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 03:58:38.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 03:58:38.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 03:58:38.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 03:58:38.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 03:58:38.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 03:58:38.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 03:58:38.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 03:58:38.963  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 03:58:38.964  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 03:58:38.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 03:58:38.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 03:58:38.968  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 03:58:38.969  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 03:58:38.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 03:58:38.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 03:58:38.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 03:58:38.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 03:58:38.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 03:58:38.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 03:58:38.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 03:58:38.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 03:58:38.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 03:58:38.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 03:58:38.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: a77a001d7bbe7415165dd3d9c01cbb39461ecac7b1d9e548ae15206845532624ab27a5b1a4bc3022ac8df5ca1e77aa08f1e71ba6bef9a75f0a96adeabf816eb0d7f6291905acb7ef933e66fd50f383fafa2c9c61ddfc82827cb71368e26184c36fbdfb73b51cbd93d6978489ac1e94d6f1e865f2a1bd6559627f3d47fe4afaf3642aaf42d721202fd1c2a853474ffa7457cf06455f120472ef47ce282b2f73a2bddaabc1e59cf2c375c2a9a03783f0a7cbf0dec8fb2a165d7e23af62a144c5df86a26cd3726da4bab0477c0dd4091667c10a7374f7f29d0635b7e965c50d463849b7c169231b2923c68c7f3387ca3ec98e63c4559e3d8ac38a8bdaeb4cf7d8bfff5f7bdef627deb1665df632391aae8a3223743e5f16e821292bf984690afc1b7c3cb052aa817d0d342df035c183a4a06fd9e8f3cd0dace44e63e8df8d57f567686fe611a816165165ed64262549c95cfd09ee9198c81965b45af610a5783030fb098f2f08fbad27ca48b22ae2acb924fa5f3ee78044625e0e6d4f32ca5e9eed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:3f:6a:dd:4f:80:4b:ac:2f:f2:f6:f0:99:44:c4:30:06:e2:09:29]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 04:00:10.336  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 04:00:10.337 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 04:00:10.339 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-29 04:00:10.340 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 04:00:10.340  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-29 04:00:10.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 04:00:10.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 04:00:10.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 04:00:10.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 04:00:10.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 04:00:10.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 04:00:10.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:00:10.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:00:10.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:00:10.472  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 04:00:10.473  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 04:00:10.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 04:00:10.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:00:10.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 04:00:10.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 04:00:10.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:00:10.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:00:10.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:00:10.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:00:10.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:00:10.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:00:10.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:00:10.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:00:10.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:00:10.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 04:00:10.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: a77a001d7bbe7415165dd3d9c01cbb39461ecac7b1d9e548ae15206845532624ab27a5b1a4bc3022ac8df5ca1e77aa08f1e71ba6bef9a75f0a96adeabf816eb0d7f6291905acb7ef933e66fd50f383fafa2c9c61ddfc82827cb71368e26184c36fbdfb73b51cbd93d6978489ac1e94d6f1e865f2a1bd6559627f3d47fe4afaf3642aaf42d721202fd1c2a853474ffa7457cf06455f120472ef47ce282b2f73a2bddaabc1e59cf2c375c2a9a03783f0a7cbf0dec8fb2a165d7e23af62a144c5df86a26cd3726da4bab0477c0dd4091667c10a7374f7f29d0635b7e965c50d463849b7c169231b2923c68c7f3387ca3ec98e63c4559e3d8ac38a8bdaeb4cf7d8bfff5f7bdef627deb1665df632391aae8a3223743e5f16e821292bf984690afc1b7c3cb052aa817d0d342df035c183a4a06fd9e8f3cd0dace44e63e8df8d57f567686fe611a816165165ed64262549c95cfd09ee9198c81965b45af610a5783030fb098f2f08fbad27ca48b22ae2acb924fa5f3ee78044625e0e6d4f32ca5e9eed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:52:cb:69:68:9d:36:80:e7:82:6e:4f:f4:6c:21:c5:52:ec:22:1e]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 04:01:59.978  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 04:01:59.980 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 04:01:59.982 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-29 04:01:59.983 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 04:01:59.984  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-29 04:01:59.985  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 04:01:59.986  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 04:01:59.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 04:01:59.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 04:01:59.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 04:01:59.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 04:01:59.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:01:59.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:01:59.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:02:00.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 04:02:00.152  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 04:02:00.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 04:02:00.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:02:00.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 04:02:00.155  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 04:02:00.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:00.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:00.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:00.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:00.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:00.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:00.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:00.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:00.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:00.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 04:02:00.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:88:5b:36:96:c6:f3:a0:44:8b:0c:5d:2d:93:5d:6e:54:bc:a6:de]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 04:02:00.776  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 04:02:00.778 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 04:02:00.779 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-29 04:02:00.779 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 04:02:00.780  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-29 04:02:00.780  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 04:02:00.781  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 04:02:00.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 04:02:00.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 04:02:00.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 04:02:00.787 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 04:02:00.787 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:02:00.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:02:00.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:02:00.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 04:02:00.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 04:02:00.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 04:02:00.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:02:00.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 04:02:00.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 04:02:00.899 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:00.899 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:00.899 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:00.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:00.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:00.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:00.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:00.902 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:00.902 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:00.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 04:02:00.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:ef:0e:30:aa:77:8a:bc:96:59:a9:e6:f2:b4:41:8f:67:5e:3c:1d]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 04:02:31.696  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 04:02:31.697 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 04:02:31.699 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-29 04:02:31.700 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 04:02:31.701  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-29 04:02:31.702  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 04:02:31.702  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 04:02:31.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 04:02:31.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 04:02:31.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 04:02:31.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 04:02:31.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:02:31.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:02:31.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:02:31.847  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 04:02:31.848  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 04:02:31.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 04:02:31.850 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:02:31.852  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 04:02:31.853  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 04:02:31.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:31.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:31.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:31.856 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:31.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:31.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:31.859 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:02:31.860 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:02:31.860 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:02:31.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 04:02:31.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:7e:e7:c8:ac:e0:5b:96:51:69:a5:4b:04:bb:0b:0b:cf:e5:9e:5e]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 04:03:07.268  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 04:03:07.269 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 04:03:07.270 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-29 04:03:07.271 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 04:03:07.271  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-29 04:03:07.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 04:03:07.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 04:03:07.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 04:03:07.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 04:03:07.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 04:03:07.278 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 04:03:07.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:03:07.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:03:07.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:03:07.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 04:03:07.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 04:03:07.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 04:03:07.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:03:07.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 04:03:07.455  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 04:03:07.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:03:07.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:03:07.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:03:07.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:03:07.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:03:07.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:03:07.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:03:07.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:03:07.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:03:07.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 04:03:07.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:c3:20:20:6f:c2:b3:e6:f3:8b:53:f4:7a:bc:b9:2e:cd:5a:2a:a5]
            modulus: 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
    public exponent: 10001

] 
2022-03-29 04:04:52.986  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-29 04:04:52.987 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-29 04:04:52.988 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-29 04:04:52.989 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-29 04:04:52.989  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-29 04:04:52.989  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-29 04:04:52.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-29 04:04:52.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-29 04:04:52.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-29 04:04:52.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-29 04:04:52.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-29 04:04:52.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:04:52.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-29 04:04:52.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:04:53.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-29 04:04:53.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-29 04:04:53.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-29 04:04:53.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-29 04:04:53.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-29 04:04:53.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-29 04:04:53.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:04:53.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:04:53.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:04:53.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:04:53.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:04:53.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:04:53.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-29 04:04:53.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-29 04:04:53.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-29 04:04:53.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-29 04:04:53.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 666371591924953070288269479423959143961911830305
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 29 02:54:18 UTC 2022
           Final Date: Sun Mar 28 02:54:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:c4:3f:ff:38:da:7d:1a:e0:c3:e5:a5:ed:63:10:93:c6:16:18:55]
            modulus: a77a001d7bbe7415165dd3d9c01cbb39461ecac7b1d9e548ae15206845532624ab27a5b1a4bc3022ac8df5ca1e77aa08f1e71ba6bef9a75f0a96adeabf816eb0d7f6291905acb7ef933e66fd50f383fafa2c9c61ddfc82827cb71368e26184c36fbdfb73b51cbd93d6978489ac1e94d6f1e865f2a1bd6559627f3d47fe4afaf3642aaf42d721202fd1c2a853474ffa7457cf06455f120472ef47ce282b2f73a2bddaabc1e59cf2c375c2a9a03783f0a7cbf0dec8fb2a165d7e23af62a144c5df86a26cd3726da4bab0477c0dd4091667c10a7374f7f29d0635b7e965c50d463849b7c169231b2923c68c7f3387ca3ec98e63c4559e3d8ac38a8bdaeb4cf7d8bfff5f7bdef627deb1665df632391aae8a3223743e5f16e821292bf984690afc1b7c3cb052aa817d0d342df035c183a4a06fd9e8f3cd0dace44e63e8df8d57f567686fe611a816165165ed64262549c95cfd09ee9198c81965b45af610a5783030fb098f2f08fbad27ca48b22ae2acb924fa5f3ee78044625e0e6d4f32ca5e9eed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81ab177e0b10c7d6651a651c9b6244b1d2fc16a0
                       609fd2d0fb0817cf15cc19bb6bec8cdd5047d3a1
                       c6b028b7964d2c9a62f226a5aad2a1203b9bd244
                       f5895fe279610193a809d9921475bf79f3dac707
                       06c9b67b819aa9865ea33876a5fe213424a6da41
                       76229690e5c3798e42aaa6241c9d6597ea2e1b42
                       04e573920292f0b05fd446520ea463a533926542
                       608ea30934307f5f8625fc6fe35cbdc44b044141
                       c8bbe91860d02b2adf10febc1a7ed23b06b18a37
                       7dfef96af3affa7eedb86ae4f14eb72c4ca998dd
                       b3fe5d4693ad09be41554b51fb8ca7c39ad87c7b
                       850804a19c3e9698e4bc65c6dbfd342841bebd77
                       b91f310110600804029d3e54ae47cfc50c7d97da
                       684c1e86e15eb732604b4e1629a9584156585d6c
                       96d9c788a1c6c1b4e3bdee994f851318c60a2841
                       a2edc4fdd89bc627a31ad70fe077362f79bc92b7
                       c1ec779d7984327a1b1fe027e9204ecb30ff8fbc
                       7970fc7ca2619b06b1a832f79b2b0e0109e06f5c
                       3c8d01174d0a828f83377c3a8c3e852af73ddd58
                       a93678bb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:45:fe:d6:2a:63:8d:07:f2:f9:1d:70:4d:51:70:27:e8:e1:6c:21]
            modulus: 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
    public exponent: 10001

]