Results

By type

          2021-09-11 06:12:49,478 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-11 06:12:50,526 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-11 06:12:51.457  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-11 06:12:54.954 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-11 06:12:55.193  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-11 06:12:55.328  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-11 06:12:58.113  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.615 seconds (JVM running for 11.895)
2021-09-11 06:16:11.196  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 06:16:11.212 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 06:16:11.259 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-11 06:16:11.264 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 06:16:11.286  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-11 06:16:11.290  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 06:16:11.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 06:16:11.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 06:16:11.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 06:16:11.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 06:16:11.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 06:16:11.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 06:16:11.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 06:16:11.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 06:16:11.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 06:16:11.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 06:16:11.981  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 06:16:11.985  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 06:16:11.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 06:16:11.989 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 06:16:12.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 06:16:12.002  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 06:16:12.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 06:16:12.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 06:16:12.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 06:16:12.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 06:16:12.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 06:16:12.022 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 06:16:12.029 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 06:16:12.029 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 06:16:12.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 06:16:12.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 06:16:12.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:48:1f:7b:ed:15:92:01:d2:79:82:26:2f:6d:65:e8:fe:e2:0b:e3]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:40:51.011  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:40:51.017 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:40:51.021 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-11 09:40:51.022 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:40:51.023  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-11 09:40:51.024  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:40:51.025  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:40:51.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:40:51.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:40:51.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:40:51.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:40:51.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:40:51.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:40:51.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:40:51.208  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:40:51.209  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:40:51.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:40:51.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:40:51.213  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:40:51.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:40:51.215 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:40:51.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:40:51.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:40:51.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:40:51.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:40:51.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:40:51.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:40:51.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:40:51.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:40:51.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:40:51.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:83:15:c9:32:ac:e2:17:d0:d9:fb:04:65:b5:55:ae:5d:70:37:68]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:45:45.466  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:45:45.469 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:45:45.474 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 09:45:45.476 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:45:45.480  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 09:45:45.488  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:45:45.490  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:45:45.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:45:45.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:45:45.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:45:45.508 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:45:45.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:45:45.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:45:45.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:45:45.669  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:45:45.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:45:45.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:45:45.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:45:45.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:45:45.687  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:45:45.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:45:45.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:45:45.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:45:45.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:45:45.697 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:45:45.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:45:45.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:45:45.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:45:45.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:45:45.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:45:45.712 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:61:8c:17:b6:0f:67:ca:d4:ff:ea:c7:5e:30:1d:ef:b3:35:38:13]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:46:11.373  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:46:11.378 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:46:11.381 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 09:46:11.382 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:46:11.383  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 09:46:11.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:46:11.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:46:11.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:46:11.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:46:11.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:46:11.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:46:11.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:46:11.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:46:11.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:46:11.517  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:46:11.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:46:11.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:46:11.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:46:11.529  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:46:11.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:46:11.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:11.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:11.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:11.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:11.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:11.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:11.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:11.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:11.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:11.538 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:46:11.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:80:d0:86:53:78:e5:45:4a:fe:00:2a:21:ca:1c:1f:9c:d6:da:02]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:46:17.428  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:46:17.430 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:46:17.431 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-11 09:46:17.435 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:46:17.445  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-11 09:46:17.458  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:46:17.459  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:46:17.459 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:46:17.459 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:46:17.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:46:17.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:46:17.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:46:17.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:46:17.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:46:17.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:46:17.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:46:17.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:46:17.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:46:17.593  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:46:17.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:46:17.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:17.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:17.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:17.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:17.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:17.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:17.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:17.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:17.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:17.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:46:17.603 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:57:37:23:0b:24:1a:26:7d:f8:c4:ce:4a:31:98:e5:46:32:24:33]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:46:53.989  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:46:54.000 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:46:54.003 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-11 09:46:54.017 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:46:54.018  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-11 09:46:54.018  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:46:54.019  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:46:54.019 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:46:54.020 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:46:54.020 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:46:54.031 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:46:54.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:46:54.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:46:54.040 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:46:54.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:46:54.210  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:46:54.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:46:54.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:46:54.212  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:46:54.215  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:46:54.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:54.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:54.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:54.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:54.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:54.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:54.230 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:46:54.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:46:54.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:46:54.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:46:54.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:dc:94:83:fc:79:68:18:24:35:82:3e:06:b9:a3:ae:0d:a3:8f:6a]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:47:44.827  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:47:44.832 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:47:44.838 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 09:47:44.840 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:47:44.841  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 09:47:44.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:47:44.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:47:44.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:47:44.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:47:44.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:47:44.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:47:44.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:47:44.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:47:44.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:47:44.965  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:47:44.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:47:44.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:47:44.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:47:44.968  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:47:44.969  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:47:44.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:47:44.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:47:44.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:47:44.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:47:44.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:47:44.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:47:44.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:47:44.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:47:44.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:47:44.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:47:44.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:5e:f6:b4:78:56:eb:de:13:d2:8a:e0:e2:10:c4:a8:62:55:f3:a5]
            modulus: b422e7fec721d220a200b280ad6f9f76e8646173878641b1f24c0587a436338b3f6706269ddbe755d0c23c91cf30ac7629f27910ad6077c5426c6931e3600a2f85eb9e199e7b3a8bef1cb68ea9b72deb094609e83f3a33017dc11f5883cdd2241f1bcebaae7437c7b235ce20b3b039de8b4acffd5e7a6858b753e97b193927102e0d09a355208237d862228678cab2dedc66c77f14695a9c35a89f1971c4b52c4b158f1590fe8ede9309da2de6879876a9b8e5d2c7ec84a54e0acc488c42ac19f99b4cfc9ab4c78db91b707ecbccf8ab8dd89de258e2008c789779ca42d845073630e9a735d10d5adaa4d831126f0cb96a10c66314b4598a73a6fdcbc7e960c3
    public exponent: 10001

] 
2021-09-11 09:49:00.210  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:49:00.213 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:49:00.217 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 09:49:00.218 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:49:00.219  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 09:49:00.219  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:49:00.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:49:00.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:49:00.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:49:00.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:49:00.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:49:00.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:49:00.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:49:00.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:49:00.351  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:49:00.352  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:49:00.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:49:00.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:49:00.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:49:00.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:49:00.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:49:00.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:49:00.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:49:00.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:49:00.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:49:00.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:49:00.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:49:00.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:49:00.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:49:00.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:49:00.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:e9:f1:aa:8c:7a:cc:a6:79:64:2d:b7:59:47:70:2c:0c:10:92:2d]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 09:49:58.862  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 09:49:58.868 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 09:49:58.871 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-11 09:49:58.873 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 09:49:58.873  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-11 09:49:58.875  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 09:49:58.875  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 09:49:58.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 09:49:58.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 09:49:58.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 09:49:58.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 09:49:58.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:49:58.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 09:49:58.888 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:49:59.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 09:49:59.013  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 09:49:59.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 09:49:59.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 09:49:59.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 09:49:59.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 09:49:59.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:49:59.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:49:59.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:49:59.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:49:59.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:49:59.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:49:59.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 09:49:59.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 09:49:59.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 09:49:59.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 09:49:59.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 142916803070087305374119472020770422122983699566
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 06:10:01 UTC 2021
           Final Date: Thu Sep 11 06:10:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6e:d7:49:38:8b:93:f0:88:90:e8:c7:d8:2d:15:bc:30:a8:18:6b:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45b9dedf13af35fbd0c07dcd63b61f3a04eab329
                       bab0bcd5f7cc9480094b7805e0e382a589e205bc
                       c2a3f7fcb950575b8f17cad69bc4bab91ac3e893
                       1346712d1b1758bc9960e1014792921a9f1c5b3d
                       156336e169f5a386bf7792c1bc2ef489452e24a7
                       8195b686d3c91a305ef5d52b254427560450ab47
                       1c8b648dbcd12f932c04724202f8c358710efb26
                       ac97c2f69f190ebda2f15d20a50ac08040fa4cd0
                       dcab204fea3c318e9142a328e96d5f8d9fd70462
                       7912d0157cdf9114fa8e8501ccd4d0b7d9584ef9
                       de1be44b598c218a83eeee3a63b046e138a1bc52
                       b3395dcfd3f5ba3923640478312183abcf8e88ff
                       56af47926aa13a5a6cd97f0389cbddec63691a84
                       5d0dae7f955c4f549c7463ec5120094a6b10e5ea
                       7c54902a16b4580c4f9bf4a4475dc692d0fcad28
                       206fb6a1f31006978907879c900ce9044618d5a2
                       6255d54582164bfa2ed7988ad9b2fed027b88e86
                       68a4ca9a069e43ae1d6019c88dc6bc159998c79c
                       ac68d9967e8ef82b7034cd2e6dc6b5026b36c0e9
                       585ea024
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:3b:3b:e2:9f:44:0e:90:0c:dc:30:c8:e5:71:41:08:2d:83:18:73]
            modulus: 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
    public exponent: 10001

]