Results

By type

          2022-04-21 03:06:27,298 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-21 03:06:28,409 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-21 03:06:29.164  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 21, 2022 3:06:31 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 21, 2022 3:06:31 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 21, 2022 3:06:31 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 21, 2022 3:06:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-21 03:06:31.873 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-21 03:06:32.184  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-21 03:06:32.405  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-21 03:06:33.253 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-21 03:06:33.257 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-21 03:06:33.259 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-21 03:06:33.263 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-21 03:06:33.305 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-21 03:06:33.309 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-21 03:06:33.440 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-21 03:06:34.056 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 21, 2022 3:06:34 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-21 03:06:35.121  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.727 seconds (JVM running for 10.437)
Apr 21, 2022 3:06:56 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-21 03:07:12.609  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 03:07:12.618 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 03:07:12.656 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-21 03:07:12.661 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 03:07:12.678  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-21 03:07:12.681  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 03:07:12.682  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 03:07:12.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 03:07:12.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 03:07:12.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 03:07:12.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 03:07:12.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 03:07:12.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 03:07:12.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 03:07:12.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 03:07:12.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 03:07:13.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 03:07:13.285  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 03:07:13.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 03:07:13.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 03:07:13.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 03:07:13.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 03:07:13.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 03:07:13.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 03:07:13.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 03:07:13.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 03:07:13.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 03:07:13.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 03:07:13.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 03:07:13.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 03:07:13.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 03:07:13.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 03:07:13.349 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:f0:39:e1:12:6a:eb:56:c2:e4:13:74:99:9a:7f:20:ea:85:46:57]
            modulus: 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
    public exponent: 10001

] 
2022-04-21 05:12:52.796  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:12:52.800 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:12:52.804 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-21 05:12:52.806 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:12:52.806  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-21 05:12:52.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:12:52.813  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:12:52.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:12:52.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:12:52.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:12:52.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:12:52.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:12:52.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:12:52.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:12:53.291  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:12:53.292  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:12:53.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:12:53.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:12:53.296  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:12:53.297  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:12:53.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:12:53.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:12:53.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:12:53.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:12:53.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:12:53.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:12:53.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:12:53.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:12:53.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:12:53.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:12:53.313 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:cb:f8:69:ac:d8:fe:e5:7f:05:81:e5:81:4c:a4:13:5d:07:4c:ea]
            modulus: b645ac7668d19cc9dc2fe91c04914740ac0d9b2561f4bcb62279af8b1df9e206cc0ef3d71b28230ecc3f33e2e114998a696e3de42163ecec0002bd8835d459cec58b5e970694c9be80c41518c2a0e29bd58ea6dc98f7aaba575d957b8ac15a38709ae9da902545a92c612ce4b6f60d2de287fefcf099b7a91d66acd4eeca1350837fefdce67a930a4a9aae18d9637913830f6e70341b7d04ff63f947a9ff6ea09f3eb2fcbbc6afb702c7e7b1ad60fbca8e535bedd59de60a36c42617a6326927668b6d00e429c403b88c04b543e5525fb4e935ceea3167ba64381f2545db686e4f76374f8672849adab27854d53962a5a31ee4a343885c2485f2b180e5e9d3bf
    public exponent: 10001

] 
2022-04-21 05:14:52.420  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:14:52.424 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:14:52.429 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-21 05:14:52.431 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:14:52.432  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-21 05:14:52.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:14:52.435  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:14:52.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:14:52.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:14:52.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:14:52.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:14:52.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:14:52.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:14:52.451 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:14:52.669  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:14:52.670  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:14:52.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:14:52.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:14:52.673  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:14:52.674  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:14:52.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:14:52.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:14:52.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:14:52.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:14:52.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:14:52.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:14:52.679 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:14:52.679 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:14:52.680 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:14:52.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:14:52.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:98:3f:0d:10:c3:60:9b:64:31:fe:88:ea:64:25:e7:66:89:0c:78]
            modulus: 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
    public exponent: 10001

] 
2022-04-21 05:16:20.756  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:16:20.757 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:16:20.759 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-21 05:16:20.760 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:16:20.761  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-21 05:16:20.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:16:20.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:16:20.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:16:20.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:16:20.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:16:20.777 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:16:20.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:16:20.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:16:20.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:16:20.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:16:20.950  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:16:20.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:16:20.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:16:20.953  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:16:20.954  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:16:20.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:16:20.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:16:20.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:16:20.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:16:20.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:16:20.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:16:20.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:16:20.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:16:20.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:16:20.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:16:20.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:60:9a:5c:fd:ee:ef:ce:3f:1c:0f:ae:1b:92:af:d2:74:63:85:8a]
            modulus: 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
    public exponent: 10001

] 
2022-04-21 05:17:07.487  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:17:07.489 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:17:07.491 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-21 05:17:07.492 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:17:07.493  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-21 05:17:07.494  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:17:07.495  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:17:07.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:17:07.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:17:07.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:17:07.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:17:07.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:17:07.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:17:07.504 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:17:07.706  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:17:07.707  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:17:07.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:17:07.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:17:07.711  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:17:07.712  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:17:07.712 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:17:07.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:17:07.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:17:07.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:17:07.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:17:07.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:17:07.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:17:07.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:17:07.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:17:07.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:17:07.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:06:24:70:03:e7:d6:5d:57:1e:60:71:e8:34:55:b9:92:b8:db:45]
            modulus: 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
    public exponent: 10001

] 
2022-04-21 05:17:40.429  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:17:40.430 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:17:40.432 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-21 05:17:40.432 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:17:40.433  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-21 05:17:40.434  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:17:40.434  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:17:40.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:17:40.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:17:40.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:17:40.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:17:40.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:17:40.443 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:17:40.443 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:17:40.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:17:40.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:17:40.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:17:40.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:17:40.592  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:17:40.593  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:17:40.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:17:40.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:17:40.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:17:40.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:17:40.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:17:40.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:17:40.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:17:40.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:17:40.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:17:40.599 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:17:40.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:f2:22:91:ca:2c:2d:9f:04:3e:30:c5:04:94:9c:06:4f:b6:17:f2]
            modulus: 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
    public exponent: 10001

] 
2022-04-21 05:18:15.000  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:18:15.001 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:18:15.003 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-21 05:18:15.004 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:18:15.004  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-21 05:18:15.005  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:18:15.005  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:18:15.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:18:15.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:18:15.007 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:18:15.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:18:15.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:18:15.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:18:15.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:18:15.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:18:15.184  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:18:15.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:18:15.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:18:15.186  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:18:15.186  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:18:15.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:18:15.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:18:15.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:18:15.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:18:15.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:18:15.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:18:15.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:18:15.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:18:15.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:18:15.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:18:15.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: e1801d44f2f1df67242212874d13a2654143ea7dc14ea6d5688631c940141ecb5ad29609d71f06c8cd8caf403ba8091fe864014d00e3fa51d3ea1ab876af54288832a4bddf5c3af3d80b6c7230fbad8583b4044bf15ead87b516d193642da8cdae95dadf06376f30b1083b50b78f256cd761eca1cbf098e617dd01a941ecbae7eb83a396871462656ec949af7660d688a5c80f5eebc87d05ba9b2f8decd90ca0a9c83ff3ff110160e7c5da44ff18721a4c87d044f939a55fbb065ad9db87acdec36ac3f3bc51e4342b62da70de7a973f2a9c1f94d00bebf5c36f2e5c18fc906d834d455c7ad657f07b8c17649c6d0311e850db3779537c16d618694326f98a9446101642f812a7fd0983870e178d2e29adc21d464c12c5ba25a8fe3616d56b3699d87666437323547cd0cf5d67edaead9108b42176e16098c37b1aba3184c6e2a75625ae9a77c8ce05403edc1cea4c76366e174f221609297698dc5c0ec54667ab77579832b91c99796909f707d2343fb407942eb61142fc6ce6a40dd1263e0b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:77:df:df:2f:a3:4b:57:d0:dd:3c:1f:a4:18:69:5d:d4:2a:5a:a9]
            modulus: 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
    public exponent: 10001

] 
2022-04-21 05:20:20.399  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:20:20.400 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:20:20.402 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-21 05:20:20.403 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:20:20.403  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-21 05:20:20.404  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:20:20.404  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:20:20.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:20:20.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:20:20.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:20:20.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:20:20.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:20:20.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:20:20.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:20:20.556  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:20:20.557  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:20:20.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:20:20.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:20:20.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:20:20.560  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:20:20.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:20:20.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:20:20.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:20:20.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:20:20.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:20:20.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:20:20.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:20:20.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:20:20.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:20:20.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:20:20.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:85:d4:cc:a1:4b:d0:42:5d:06:e3:2b:9e:f4:ff:34:65:84:8d:9f]
            modulus: 9c98d527a4c8b4391f9290903b6846fccd240666025e69c159989ee91c60ca315742375f5509de666d143f85935a4359360099446ef5b9eb705450afd0c64e4ae55781daffaeb51ceb2a13a949a49891d6753f5dbfdd6af85d8258394716b6514e98069647fa65cc131864da5f8295f877db43af6e3d4877bf86d9e72865785aba6efe4df6f75161f2bd7f6a1c8be11a8dc4c77354fc8d1732e484a9da99e972830b15bb87fe0a42f25f28cc3698236457c120e4a64cb8584dfd528c909b0f9ebed1d832141e9801cb3bc5d86830539fef70e46a307e06e3b2e290a2dcea68de1f860407cf0f1490f76fa49dacd323cebc0e87107099510c1b178972619035b3
    public exponent: 10001

] 
2022-04-21 05:20:34.218  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-21 05:20:34.221 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-21 05:20:34.224 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-21 05:20:34.225 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-21 05:20:34.226  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-21 05:20:34.226  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-21 05:20:34.227  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-21 05:20:34.227 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-21 05:20:34.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-21 05:20:34.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-21 05:20:34.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-21 05:20:34.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:20:34.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-21 05:20:34.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:20:34.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-21 05:20:34.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-21 05:20:34.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-21 05:20:34.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-21 05:20:34.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-21 05:20:34.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-21 05:20:34.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:20:34.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:20:34.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:20:34.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:20:34.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:20:34.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:20:34.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-21 05:20:34.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-21 05:20:34.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-21 05:20:34.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-21 05:20:34.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275281790773611418218960573157412674092350167217
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 21 03:04:06 UTC 2022
           Final Date: Tue Apr 20 03:04:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e7:16:c2:d5:be:ac:70:c4:d2:d6:ff:16:a6:a5:9c:46:02:47:f3:a2]
            modulus: e1801d44f2f1df67242212874d13a2654143ea7dc14ea6d5688631c940141ecb5ad29609d71f06c8cd8caf403ba8091fe864014d00e3fa51d3ea1ab876af54288832a4bddf5c3af3d80b6c7230fbad8583b4044bf15ead87b516d193642da8cdae95dadf06376f30b1083b50b78f256cd761eca1cbf098e617dd01a941ecbae7eb83a396871462656ec949af7660d688a5c80f5eebc87d05ba9b2f8decd90ca0a9c83ff3ff110160e7c5da44ff18721a4c87d044f939a55fbb065ad9db87acdec36ac3f3bc51e4342b62da70de7a973f2a9c1f94d00bebf5c36f2e5c18fc906d834d455c7ad657f07b8c17649c6d0311e850db3779537c16d618694326f98a9446101642f812a7fd0983870e178d2e29adc21d464c12c5ba25a8fe3616d56b3699d87666437323547cd0cf5d67edaead9108b42176e16098c37b1aba3184c6e2a75625ae9a77c8ce05403edc1cea4c76366e174f221609297698dc5c0ec54667ab77579832b91c99796909f707d2343fb407942eb61142fc6ce6a40dd1263e0b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 59dbd9674f7d800007a506105b9363d32e55f68d
                       f2579abbe16773cc5185b57b6480832fccf75e8c
                       a45b326cd3f1f43a95097c1dfdcccfad934a1caf
                       140a6c7c838d6b22354db695b5c54e476b446546
                       1fead9e542338e8c2217599b237b217836706603
                       690e28b226917306280088fcae4a2d86ac1d775b
                       11ed661bfb7fc83ed98c5d551960562d4c34ce0c
                       7695f688b2d6e1e50f4f368666e1a64753d2fab1
                       ef34f78dd1dec94a358f895e733b869d8376aaf9
                       c6fbd325d410f3d8bf2f8287c7f630574e357aa4
                       6801258f94d855570d779aad37fc245b37d65700
                       77c0de280a72be39eb838e4a9a2fb896696c53d8
                       690920a39c6f105632041e0f097cc981c5850f52
                       e84f1b7b36cf74558b4c124ac47d8a2ba3e243ea
                       ce4f5a6ff9663dc3533c0a7a08a3421f256b613b
                       bfe1e5259e9942feebfe4f641e9c92370ad0db42
                       52f09b838ad42005d3f1d2208d5dca6e8647fe60
                       02660f35990e1b20d2b875d5a8133d12bdf0ac2f
                       29dbe149e22ccc544b32a254765dcc8b6e439a5a
                       2399ab9a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:ea:ba:26:3f:ef:65:71:a7:48:61:ac:a7:a4:7e:e8:1d:d1:d1:50]
            modulus: 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
    public exponent: 10001

]