Results

By type

          2022-04-09 03:05:27,848 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-09 03:05:29,257 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-09 03:05:30.000  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 09, 2022 3:05:31 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 09, 2022 3:05:31 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 09, 2022 3:05:31 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 09, 2022 3:05:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-09 03:05:32.519 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-09 03:05:32.814  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-09 03:05:32.984  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-09 03:05:33.665 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-09 03:05:33.668 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-09 03:05:33.669 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-09 03:05:33.673 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-09 03:05:33.711 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-09 03:05:33.714 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-09 03:05:33.835 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-09 03:05:34.365 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 09, 2022 3:05:35 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-09 03:05:35.262  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.219 seconds (JVM running for 9.941)
Apr 09, 2022 3:06:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-09 03:06:31.812  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 03:06:31.820 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 03:06:31.864 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-09 03:06:31.871 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 03:06:31.893  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-09 03:06:31.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 03:06:31.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 03:06:31.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 03:06:31.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 03:06:31.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 03:06:31.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 03:06:31.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 03:06:31.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 03:06:31.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 03:06:31.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 03:06:31.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 03:06:32.504  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 03:06:32.507  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 03:06:32.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 03:06:32.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 03:06:32.517  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 03:06:32.518  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 03:06:32.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 03:06:32.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 03:06:32.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 03:06:32.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 03:06:32.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 03:06:32.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 03:06:32.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 03:06:32.539 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 03:06:32.539 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 03:06:32.541 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 03:06:32.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: a2f054ac2d95f7965621e47756c3e0be35bdce54c2084ab48c8139f4d9489a9b540241d75bdfbd0bef2bbb226f270ff67e26d506e6fb28a12840872fe17b45e0183ea5562c9e254e8e157644158f2cccbf2777e68a29e1d252d90345f1f7759994e46bc6ebe2d54798eddab80bcc9e827ddeabb1cb567cdea75c24d569413fb422c39bb2b06e4d9d46f0c7f59bd3e6b17b79000ae1fbcf325f5dc19b38998a6e1da19fd855c9e24a074cb22a80bc1832093da823305553d0c5dc8a1ccd06c157fd12d873135b13b16b8fea1203b74897e6932c78e54f74c35d720cc57877788c2a90052c721e8203115931fcb0c22627fa6d9d0f5f94a16c0d3d4744d160349ea6fc8e30b8d14351f9b2c8c6ce199f25e611eb47f622fef1c80715f5aeb2683e85e2b5349a6e94535dc6212a52f13cfb10f467289c844b6e74bcba488ed806311b871f680a8f6d3928b9648ed3a4c6114d9a51cab4a3188285ac7836010715ad3afa7d746c527e1fe7d9e9226c2f4d22216ac6c8d8a8a0a3c6a743beeb2bffaf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:e4:9d:ee:5d:64:5f:3e:c5:d4:c9:89:c8:f2:cb:e4:0c:02:63:69]
            modulus: ba690f0187f73afbd1c5e1fce007e2a6eb6d9e0f100ce1441aea03ad985a9a6646827280bd31d1ceca5e2d225301642fd618a3218cef43744bcf3650e4e6ca8e2e89d46745545ab18382fd8a1fe628b3436c9fe40de43b23838d986ca5f83464afce38bee42636edeb9c23d5d79ee9abdecc13ead5e397d8a944935328410db910ec14cbf7937c0be7b4f7eef4294ac8ad51890397b024baea428d3aef048c10ad9c255eeb50fb23342b82cda74a5af8b67046690651d4925203808c52eae04a073cec612b40decc2d8e4e37143f91f8bb5f02f0aaa5e8b77c3c5111e3fbaffb8023c78160f4be88333a9c2a2c9b41f46020bc2412a8415ce72798c3a94deaf9
    public exponent: 10001

] 
2022-04-09 04:21:10.009  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:21:10.012 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:21:10.015 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-09 04:21:10.016 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:21:10.017  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-09 04:21:10.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:21:10.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:21:10.019 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:21:10.019 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:21:10.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:21:10.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:21:10.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:21:10.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:21:10.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:21:10.238  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:21:10.239  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:21:10.239 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:21:10.240 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:21:10.243  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:21:10.243  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:21:10.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:21:10.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:21:10.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:21:10.246 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:21:10.246 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:21:10.246 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:21:10.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:21:10.248 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:21:10.248 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:21:10.249 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:21:10.256 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:f4:bb:7b:35:44:53:2f:a0:c6:f2:3c:24:bd:09:a4:3a:3f:09:de]
            modulus: bd1a28acadd1d81b2a386fa7d8699cfe5290fdda62a09543cac8c6be39e6255b8ffd8d2cd66f8a75ed7d666bdab6aa6eefcb7a005fac7f43be01c8b2bb0bcb4c4be1eadd378f1c9f09560e2cf2163b75488bab003564eaf245816cc7eaa5931a83b72d9b9a6e6645bd167ceab6ec5b2f5a154f0ac6d1fe6b211c77a163b29c5f6a0e415b9584e1b4052f59e74e8b3475e8768b81fd31e4e769043a0d7b796c8ecea2063c9d05d2674d351ea39fbf7c309d94e49071a27756a03968fd1dccc6b58f0c4c80cd46e1b8cc4c063853ff10fe8478b73eec822e59386fd100ffbcdb1ca9dcfa2909c77afd53933761d5fd14478326f4209b2792827b3087e5da6136e5
    public exponent: 10001

] 
2022-04-09 04:22:13.662  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:22:13.664 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:22:13.666 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-09 04:22:13.667 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:22:13.668  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-09 04:22:13.670  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:22:13.671  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:22:13.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:22:13.672 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:22:13.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:22:13.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:22:13.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:22:13.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:22:13.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:22:13.876  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:22:13.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:22:13.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:22:13.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:22:13.888  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:22:13.889  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:22:13.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:22:13.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:22:13.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:22:13.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:22:13.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:22:13.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:22:13.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:22:13.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:22:13.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:22:13.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:22:13.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:65:9b:d5:7a:1a:4f:fe:15:1b:c4:28:8b:5b:c2:92:d4:fe:a2:42]
            modulus: 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
    public exponent: 10001

] 
2022-04-09 04:23:45.361  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:23:45.362 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:23:45.366 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-09 04:23:45.367 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:23:45.367  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-09 04:23:45.376  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:23:45.376  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:23:45.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:23:45.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:23:45.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:23:45.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:23:45.398 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:23:45.399 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:23:45.399 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:23:45.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:23:45.531  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:23:45.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:23:45.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:23:45.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:23:45.535  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:23:45.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:23:45.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:23:45.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:23:45.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:23:45.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:23:45.538 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:23:45.538 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:23:45.539 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:23:45.539 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:23:45.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:23:45.544 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: a2f054ac2d95f7965621e47756c3e0be35bdce54c2084ab48c8139f4d9489a9b540241d75bdfbd0bef2bbb226f270ff67e26d506e6fb28a12840872fe17b45e0183ea5562c9e254e8e157644158f2cccbf2777e68a29e1d252d90345f1f7759994e46bc6ebe2d54798eddab80bcc9e827ddeabb1cb567cdea75c24d569413fb422c39bb2b06e4d9d46f0c7f59bd3e6b17b79000ae1fbcf325f5dc19b38998a6e1da19fd855c9e24a074cb22a80bc1832093da823305553d0c5dc8a1ccd06c157fd12d873135b13b16b8fea1203b74897e6932c78e54f74c35d720cc57877788c2a90052c721e8203115931fcb0c22627fa6d9d0f5f94a16c0d3d4744d160349ea6fc8e30b8d14351f9b2c8c6ce199f25e611eb47f622fef1c80715f5aeb2683e85e2b5349a6e94535dc6212a52f13cfb10f467289c844b6e74bcba488ed806311b871f680a8f6d3928b9648ed3a4c6114d9a51cab4a3188285ac7836010715ad3afa7d746c527e1fe7d9e9226c2f4d22216ac6c8d8a8a0a3c6a743beeb2bffaf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:0d:d7:c2:b8:ed:3b:d9:0f:25:9d:b5:a4:51:73:c5:51:fa:d2:25]
            modulus: 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
    public exponent: 10001

] 
2022-04-09 04:25:36.693  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:25:36.697 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:25:36.700 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-09 04:25:36.702 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:25:36.702  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-09 04:25:36.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:25:36.704  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:25:36.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:25:36.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:25:36.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:25:36.710 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:25:36.711 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:25:36.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:25:36.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:25:36.869  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:25:36.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:25:36.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:25:36.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:25:36.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:25:36.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:25:36.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:25:36.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:25:36.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:25:36.879 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:25:36.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:25:36.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:25:36.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:25:36.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:25:36.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:25:36.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:25:36.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:d0:1f:3e:0f:78:37:4b:4d:b8:f5:0d:17:e0:69:b0:6f:78:7c:60]
            modulus: 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
    public exponent: 10001

] 
2022-04-09 04:25:48.428  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:25:48.429 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:25:48.431 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-09 04:25:48.431 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:25:48.432  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-09 04:25:48.432  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:25:48.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:25:48.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:25:48.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:25:48.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:25:48.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:25:48.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:25:48.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:25:48.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:25:48.548  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:25:48.549  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:25:48.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:25:48.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:25:48.551  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:25:48.551  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:25:48.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:25:48.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:25:48.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:25:48.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:25:48.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:25:48.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:25:48.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:25:48.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:25:48.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:25:48.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:25:48.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:c9:da:ea:48:1a:73:0f:82:20:09:06:7c:d5:97:9a:70:de:b7:62]
            modulus: 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
    public exponent: 10001

] 
2022-04-09 04:26:21.768  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:26:21.769 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:26:21.770 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-09 04:26:21.771 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:26:21.774  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-09 04:26:21.775  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:26:21.775  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:26:21.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:26:21.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:26:21.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:26:21.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:26:21.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:26:21.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:26:21.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:26:21.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:26:21.925  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:26:21.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:26:21.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:26:21.927  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:26:21.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:26:21.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:26:21.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:26:21.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:26:21.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:26:21.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:26:21.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:26:21.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:26:21.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:26:21.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:26:21.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:26:21.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:15:ee:34:6e:88:15:86:bd:16:83:2d:fa:50:8b:75:bc:de:de:a1]
            modulus: a6f9532423f371a7a04b798dea1d3a443c96a52a5fd05ff68a2e444cc3f98c814cf5295d0145c1314bb6baee175ecc3a589d555be4924539f877eab75a2f281c7dbdd8f993defbc1d1f6c5b392e50f9cde4ae21000c097194dd4427808d6e1b130494934b08846de06102623540e73a451db068d0cdded429e2f317f72a5302829a596f8ed1b40b614e595840d9201b1d6e1c03e9fcffd826b34f66e3a7fc1361f4a750d23922e1e9c7e5bd6d93c6984faa1672606d86c8b9f03b45949585ea87ab8151ef833bcba2240a7de7572758b30a115fea13f3c802d0869fffe4a0eea5903601ce32c85ebdc5d2581f55d02d1a7a3475a26a0ad6c77ad90e3e4bb0e5b
    public exponent: 10001

] 
2022-04-09 04:26:55.676  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:26:55.677 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:26:55.679 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-09 04:26:55.679 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:26:55.680  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-09 04:26:55.681  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:26:55.681  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:26:55.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:26:55.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:26:55.683 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:26:55.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:26:55.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:26:55.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:26:55.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:26:55.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:26:55.825  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:26:55.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:26:55.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:26:55.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:26:55.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:26:55.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:26:55.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:26:55.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:26:55.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:26:55.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:26:55.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:26:55.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:26:55.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:26:55.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:26:55.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:26:55.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:11:52:5c:6a:ac:9a:1b:4a:9d:fc:47:93:6d:0d:df:fc:26:26:d9]
            modulus: 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
    public exponent: 10001

] 
2022-04-09 04:28:41.730  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-09 04:28:41.731 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-09 04:28:41.732 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-09 04:28:41.733 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-09 04:28:41.734  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-09 04:28:41.734  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-09 04:28:41.734  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-09 04:28:41.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-09 04:28:41.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-09 04:28:41.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-09 04:28:41.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-09 04:28:41.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:28:41.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-09 04:28:41.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:28:41.882  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-09 04:28:41.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-09 04:28:41.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-09 04:28:41.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-09 04:28:41.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-09 04:28:41.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-09 04:28:41.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:28:41.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:28:41.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:28:41.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:28:41.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:28:41.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:28:41.888 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-09 04:28:41.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-09 04:28:41.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-09 04:28:41.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-09 04:28:41.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 60675914505221942473407940936296122072440100638
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 09 03:03:28 UTC 2022
           Final Date: Thu Apr 08 03:03:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9
                       8bdfd9cf03ab610308ac68b206fd7caa9144688f
                       b04b61233fd33e5d1de3704e54fafd7125c68d25
                       ff2486b3957820436dd00353ef7f09310d4c450c
                       bc360ef262791a455b27b990254023394ae72e11
                       04cb48e85dc9c596f55932cdfeb9a1202005dcbb
                       c49e66cce368015e757f643992a2e4c311ceabfb
                       285e1cb0be05de398506ab5c713c574e56c74431
                       18601e862740d3d37ae4cd78dd6866d31ca3d8d2
                       410a86186d2bc66d5c7bae58c4a4aad242b2ec53
                       f26c679fb1bce0ca9a66c0e92a538e1d053b1927
                       a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066
                       f7dab01c9a10207e2f936ada9bf4ba44978c0e81
                       2daeb48f1a7d32909abc1ce7977b4a0f60a46e70
                       1c80b01b9764ccf1ac4a3849dc820bd59472ebed
                       1fd68e8b839f97ae85a764a290cc830401c26992
                       2abd30e3ed1fdfce24c2047de78933cf3cfc973d
                       56f0668392b43235394e1fb5e73d8d487cb6e8c9
                       32304f918727587200ce0ce2e206fc600fe0534f
                       da880413
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:83:b8:14:8f:c8:3f:63:20:d2:c0:5d:78:df:3a:9d:1b:be:fe:99]
            modulus: d8d9945fa7bbca0261152899a09353a95498bbaad8603732fd89659716cd71783735031938c4b5f2981ef6f08feb4a83167dcb870715bfc5b1112c5def2190bbfc2c692f18fe7595da66acafceb36fb72646778a536cd2aacd4c0af5b45a40bfa5e6fdf82ef0ef07f81a9847c5f6dcd43c28ad46a0423da302c146ae52af44406e4264d26aa25bbaa0fda3680b77defa1083ae9a2d064b1ae5105e1870fc5eb93d041c4da2050d8d021c5718071f50488162dac723ee259fc337dbe519ec04bd957f821882faf458f33c773a6169a9fe927361168d0eba34e663fc45ae540bdc4a607fbaabeaff5c916de0a666128bc0157ac167a52ae1b8164e1d9e55f81e4b
    public exponent: 10001

]