Results

By type

          2022-04-11 02:59:57,430 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-11 02:59:58,458 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-11 02:59:59.215  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 11, 2022 3:00:01 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 11, 2022 3:00:01 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 11, 2022 3:00:01 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 11, 2022 3:00:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-11 03:00:01.634 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-11 03:00:01.908  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-11 03:00:02.054  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-11 03:00:02.725 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-11 03:00:02.728 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-11 03:00:02.729 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-11 03:00:02.736 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-11 03:00:02.781 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-11 03:00:02.784 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-11 03:00:02.909 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-11 03:00:03.503 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 11, 2022 3:00:04 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-11 03:00:04.520  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.908 seconds (JVM running for 9.677)
Apr 11, 2022 3:00:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-11 03:01:35.312  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 03:01:35.320 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 03:01:35.362 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-11 03:01:35.366 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 03:01:35.383  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-11 03:01:35.385  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 03:01:35.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 03:01:35.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 03:01:35.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 03:01:35.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 03:01:35.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 03:01:35.401 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 03:01:35.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 03:01:35.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 03:01:35.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 03:01:35.442 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 03:01:35.924  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 03:01:35.926  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 03:01:35.926 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 03:01:35.928 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 03:01:35.937  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 03:01:35.937  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 03:01:35.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 03:01:35.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 03:01:35.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 03:01:35.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 03:01:35.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 03:01:35.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 03:01:35.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 03:01:35.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 03:01:35.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 03:01:35.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 03:01:35.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:dd:37:5f:58:a4:d2:54:f6:94:27:5e:70:d7:9a:4e:bc:63:e5:17]
            modulus: e9a663a12ed3eaa79d36cfa947841ab2cdd42c15159fb69938ae37328da65158ef4fd7590e8664019a7f9d7276be5109f7552d457b031b05b8fa4952ff2055482f6f8af2f4ebd3bda615378f9b9f515d52ddbb14a40393d692f77c0c15afe5571dd5af1a636645f818e768fe7a2728d635946d3376cc64ac0e4064dcfd2684d31f2d0c09ff2771a22b8b86dd303e277ffda202255be50e2bcd16d7d45e2ed6329deb5e01ee4314ec8b4eba66863871ec8b75c8e69cd3fee9b0bc33a0d0d6025a38d552a3220496b5329d1acba2ac727e27748885bc0baaee4112d24de1e5be67766169db6811cab1c4464a43150fa328980c81830c9abdd140a8752d9f4f062b
    public exponent: 10001

] 
2022-04-11 04:13:53.816  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:13:53.822 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:13:53.827 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-11 04:13:53.828 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:13:53.829  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-11 04:13:53.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:13:53.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:13:53.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:13:53.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:13:53.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:13:53.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:13:53.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:13:53.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:13:53.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:13:54.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:13:54.024  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:13:54.025 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:13:54.025 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:13:54.028  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:13:54.029  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:13:54.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:13:54.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:13:54.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:13:54.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:13:54.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:13:54.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:13:54.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:13:54.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:13:54.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:13:54.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:13:54.041 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:1b:15:7c:3f:8d:b3:b0:4a:ed:84:b1:33:16:eb:6b:3e:66:d6:b3]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:15:02.489  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:15:02.490 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:15:02.492 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-11 04:15:02.492 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:15:02.493  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-11 04:15:02.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:15:02.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:15:02.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:15:02.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:15:02.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:15:02.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:15:02.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:15:02.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:15:02.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:15:02.667  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:15:02.668  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:15:02.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:15:02.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:15:02.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:15:02.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:15:02.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:15:02.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:15:02.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:15:02.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:15:02.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:15:02.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:15:02.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:15:02.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:15:02.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:15:02.675 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:15:02.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:bb:a7:4a:14:5c:1a:6c:19:ed:4a:2a:20:ae:fa:ab:0d:cf:d2:5a]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:16:14.039  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:16:14.040 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:16:14.042 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-11 04:16:14.043 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:16:14.043  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-11 04:16:14.044  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:16:14.045  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:16:14.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:16:14.046 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:16:14.046 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:16:14.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:16:14.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:16:14.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:16:14.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:16:14.254  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:16:14.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:16:14.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:16:14.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:16:14.257  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:16:14.257  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:16:14.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:16:14.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:16:14.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:16:14.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:16:14.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:16:14.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:16:14.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:16:14.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:16:14.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:16:14.262 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:16:14.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:eb:2b:dc:3f:15:13:6a:12:5c:59:17:b5:70:b9:07:33:e2:a4:f2]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:18:02.416  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:18:02.417 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:18:02.419 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-11 04:18:02.419 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:18:02.420  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-11 04:18:02.421  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:18:02.421  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:18:02.422 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:18:02.422 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:18:02.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:18:02.429 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:18:02.429 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:18:02.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:18:02.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:18:02.586  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:18:02.587  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:18:02.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:18:02.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:18:02.591  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:18:02.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:18:02.592 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:02.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:02.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:02.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:02.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:02.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:02.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:02.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:02.597 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:02.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:18:02.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:38:38:a6:c2:d5:e9:16:44:3d:fd:1d:ee:c6:93:d3:b9:08:31:22]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:18:05.201  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:18:05.202 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:18:05.204 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-11 04:18:05.204 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:18:05.205  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-11 04:18:05.205  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:18:05.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:18:05.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:18:05.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:18:05.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:18:05.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:18:05.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:18:05.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:18:05.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:18:05.305  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:18:05.307  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:18:05.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:18:05.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:18:05.311  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:18:05.314  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:18:05.314 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:05.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:05.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:05.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:05.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:05.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:05.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:05.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:05.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:05.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:18:05.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:92:77:5f:21:4a:50:df:0b:ac:0c:af:4e:22:03:ee:9f:3f:b2:ff]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:18:33.792  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:18:33.792 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:18:33.794 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-11 04:18:33.795 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:18:33.795  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-11 04:18:33.796  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:18:33.796  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:18:33.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:18:33.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:18:33.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:18:33.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:18:33.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:18:33.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:18:33.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:18:33.923  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:18:33.924  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:18:33.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:18:33.925 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:18:33.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:18:33.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:18:33.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:33.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:33.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:33.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:33.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:33.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:33.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:18:33.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:18:33.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:18:33.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:18:33.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:1f:40:d0:31:26:41:dc:74:f2:c8:f7:4f:e4:90:76:b1:ed:8a:f3]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:19:07.938  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:19:07.940 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:19:07.943 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-11 04:19:07.946 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:19:07.946  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-11 04:19:07.948  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:19:07.948  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:19:07.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:19:07.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:19:07.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:19:07.957 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:19:07.958 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:19:07.958 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:19:07.958 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:19:08.106  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:19:08.107  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:19:08.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:19:08.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:19:08.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:19:08.109  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:19:08.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:19:08.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:19:08.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:19:08.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:19:08.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:19:08.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:19:08.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:19:08.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:19:08.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:19:08.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:19:08.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:19:e2:b0:60:44:3d:26:21:7c:c9:d0:36:c7:36:b3:6e:00:b0:32]
            modulus: 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
    public exponent: 10001

] 
2022-04-11 04:20:53.646  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-11 04:20:53.648 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-11 04:20:53.650 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-11 04:20:53.651 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-11 04:20:53.651  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-11 04:20:53.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-11 04:20:53.653  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-11 04:20:53.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-11 04:20:53.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-11 04:20:53.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-11 04:20:53.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-11 04:20:53.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:20:53.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-11 04:20:53.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:20:53.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-11 04:20:53.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-11 04:20:53.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-11 04:20:53.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-11 04:20:53.786  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-11 04:20:53.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-11 04:20:53.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:20:53.788 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:20:53.788 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:20:53.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:20:53.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:20:53.790 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:20:53.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-11 04:20:53.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-11 04:20:53.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-11 04:20:53.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-11 04:20:53.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72410966121742260375288996484795247935968840270
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 11 02:57:51 UTC 2022
           Final Date: Sat Apr 10 02:57:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6c:1f:e6:8f:65:b1:a3:31:ce:9d:90:7d:56:cf:5f:e2:63:d8:be:97]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 840a5f1a5e389df0cde8b9ab4e8d854103c383a0
                       fc9dff134ce99fd63e8911dff862c213f4c77a5e
                       15ff01e2c8915747be9d02a1868110e60062de15
                       716f419386650e7bdc18cefa53e6b8b260458c1b
                       bf6ee810fb5342bb15639c3f163bb4ca3dfbceb3
                       322b7e6e1edb28dc94472424d48e6132a70fc4c6
                       381ebc5e9809422e4bfccc0376771247e895791f
                       a1ff7055e07b3ca619da96eff4f2898e0976977d
                       499fd7e11b924e632da124d393615bf2b161873e
                       9a4f771b43784f56b601e36430d9a7759e47d77d
                       4f6c0e5f84b424da42ebabeb90978a0a1d187221
                       4fed30a7695e01f8684709500f5b0c70df4f2a68
                       259137ca01ab10348f42b05b7fb89cd29945f1d0
                       214322e73d03c32dfc11d6e864725802392ac086
                       a36b4ee266e1204b5950c076956c0d81ec21d914
                       c0688323fd19129c241ebbd4f0549354f75ea8f2
                       f6c481d8259fb9dda4f4c0809f88b1d817db05a3
                       d0489beb41fd1672adde12e061eed235219a7054
                       ffc16c07bded91e19409409d15879cad0c6259d2
                       8f0376e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:5e:ab:3a:26:97:1f:66:b3:bf:53:a5:ad:c7:85:01:c0:38:44:c3]
            modulus: ebaf27742c1bb3f063ca2964d09a6c85aa9a4fa7eb7a1134feada4e021eb38a15697664fcc0c59dd14764ed1e1d61ce07a6e8f498afa61221c9d985b6dce5d4087b8499f780bec03c7d1c796a3483f3c296a8957d6200ace4adef75ca31995b2c765ce2fce731d872e9498a3509c0d822e026efa4a9822c10877d6737f1bd0b66e5a5b206381ec2c4d95b5ec23c989e5bb05b321d28507fd2249a82bc7f058c5550a61f8550a15524abc7e876521d3109dc836a4e485061c9564554745e4b459fdf443d54a790ec23343058fa78ff5b92056f813f4dea949537756c41af847f6674519e7b52185110e6325032675dbb57c28e3bc4e786d81bb70f9d29b630941
    public exponent: 10001

]