Results

By type

          2021-09-28 06:41:29,857 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-28 06:41:30,664 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-28 06:41:31.518  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-28 06:41:34.577 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-28 06:41:34.814  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-28 06:41:34.955  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-28 06:41:37.314  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.192 seconds (JVM running for 10.037)
2021-09-28 06:48:22.846  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 06:48:22.859 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 06:48:22.903 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-28 06:48:22.909 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 06:48:22.946  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-28 06:48:22.951  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 06:48:22.953  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 06:48:22.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 06:48:22.957 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 06:48:22.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 06:48:22.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 06:48:22.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 06:48:23.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 06:48:23.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 06:48:23.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 06:48:23.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 06:48:23.811  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 06:48:23.815  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 06:48:23.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 06:48:23.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 06:48:23.839  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 06:48:23.841  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 06:48:23.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 06:48:23.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 06:48:23.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 06:48:23.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 06:48:23.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 06:48:23.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 06:48:23.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 06:48:23.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 06:48:23.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 06:48:23.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 06:48:23.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:ea:23:78:64:23:6d:b8:a6:de:36:49:84:2f:73:56:68:04:10:f0]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:02:25.973  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:02:25.977 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:02:25.980 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-28 09:02:25.982 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:02:25.983  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-28 09:02:25.984  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:02:25.986  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:02:25.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:02:25.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:02:25.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:02:26.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:02:26.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:02:26.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:02:26.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:02:26.291  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:02:26.292  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:02:26.293 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:02:26.293 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:02:26.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:02:26.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:02:26.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:02:26.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:02:26.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:02:26.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:02:26.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:02:26.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:02:26.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:02:26.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:02:26.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:02:26.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:02:26.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:8b:d5:9a:ed:20:03:21:55:26:7b:53:ef:02:f1:75:1b:f3:58:8d]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:04:07.030  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:04:07.035 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:04:07.040 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-28 09:04:07.041 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:04:07.042  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-28 09:04:07.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:04:07.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:04:07.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:04:07.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:04:07.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:04:07.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:04:07.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:04:07.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:04:07.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:04:07.229  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:04:07.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:04:07.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:04:07.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:04:07.234  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:04:07.235  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:04:07.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:04:07.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:04:07.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:04:07.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:04:07.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:04:07.239 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:04:07.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:04:07.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:04:07.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:04:07.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:04:07.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:87:b3:e1:5f:a1:62:90:69:36:e2:40:cf:32:ba:9f:2c:1a:2f:6f]
            modulus: b0eb222bad88b27196093a6aff3d70ac8f4037f14c86fbbb59d670cb571dc12fe939c56aeacc2546c74e7bfc24df895ee57856f4ba3ff5c9bc58f4118895faff8b7e06ed3491aaa73cb42a59a7431337763650339fa8e89ebe0dffb0227c0a15c59b54b152e17da4a271caa8fc1f8474a44ef42be849c04ab329f785d85a7aabd2e87f878aa5a26ee63f62ee1dd4e0a6dbca9ea2b87e840e60dfb9685ad3278142c0246aa4e6a97e5749b63ad204723c40ca81d70ed38f6b5d47e052da608739b6e6be9856cd2446b72b1a4987b2825a44407fc59e56fb8fc889c04e342c9235d291e2e01ff029c3bff70d6e75dbc2364fb9cb67eb3b3b1a98e7e68dcf5d7b55
    public exponent: 10001

] 
2021-09-28 09:05:59.199  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:05:59.205 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:05:59.209 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-28 09:05:59.211 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:05:59.212  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-28 09:05:59.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:05:59.215  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:05:59.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:05:59.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:05:59.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:05:59.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:05:59.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:05:59.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:05:59.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:05:59.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:05:59.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:05:59.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:05:59.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:05:59.460  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:05:59.461  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:05:59.462 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:05:59.462 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:05:59.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:05:59.464 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:05:59.464 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:05:59.465 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:05:59.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:05:59.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:05:59.467 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:05:59.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:05:59.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:24:ed:f0:60:89:3c:6a:8c:b4:b9:7b:27:99:e3:34:68:1d:5d:4c]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:07:19.024  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:07:19.027 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:07:19.031 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-28 09:07:19.032 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:07:19.033  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-28 09:07:19.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:07:19.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:07:19.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:07:19.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:07:19.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:07:19.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:07:19.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:07:19.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:07:19.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:07:19.227  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:07:19.227  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:07:19.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:07:19.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:07:19.235  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:07:19.236  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:07:19.241 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:19.241 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:19.242 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:19.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:19.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:19.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:19.245 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:19.245 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:19.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:19.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:07:19.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:ce:ea:3a:0f:ce:5a:a0:bb:45:9c:94:cd:8a:78:4b:40:a2:64:de]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:07:51.627  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:07:51.632 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:07:51.640 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-28 09:07:51.643 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:07:51.644  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-28 09:07:51.646  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:07:51.647  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:07:51.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:07:51.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:07:51.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:07:51.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:07:51.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:07:51.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:07:51.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:07:51.856  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:07:51.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:07:51.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:07:51.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:07:51.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:07:51.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:07:51.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:51.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:51.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:51.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:51.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:51.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:51.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:51.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:51.864 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:51.864 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:07:51.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: d87e1bc668efe595d6fb46d0d7b05a2241ebc9155415348d79b1898317239366ee8e01c77e781fa5fee6dc995d80a31339ecb6d6df1dad88635b3aa2e290febe1cb93b25729d0a018f5d265f16f9744e8451d56e0372980bb84f9c8feffb0018fdc5920f53b7f621a4a8278880aaf4478e55074b917890304fff910fb24e9847b521661a5f7d5e0694868efaa1eb8f9aed40acd5a47aa7bb77b44e34b56951aa40cf25d7e0f3ce4bae63a691e0023192af8a2b28077cb00441c7d7bd711b61271def5985ed20383e4dc6a15d0a4299e0e52c4e196d257656d77c993ba88aa15b363ad2cdc719a09009e0698364162a5402883d50715f19fb635d8fe6a457059aa8db683f9f49203f2c7418f43b0030e213de0fcb6a69c3180fc786bf90ee38ab8be8a9a78fa450b47e3781bec21023e3327ec70fedf6aaefa186ec304798c8b6a145ff84a289aae87bb7bbfb63b16c1172cbf94ef4221eccf23b6c70dbaebb56690869dc5717a8c5023c850df9244d89ba0025901e8634f8cb47965911be3287
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:50:d7:7e:bf:58:c3:4e:dc:8f:81:b9:57:a6:de:ee:c5:81:b0:81]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:07:52.156  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:07:52.157 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:07:52.158 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-28 09:07:52.159 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:07:52.159  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-28 09:07:52.160  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:07:52.162  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:07:52.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:07:52.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:07:52.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:07:52.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:07:52.170 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:07:52.170 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:07:52.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:07:52.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:07:52.269  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:07:52.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:07:52.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:07:52.271  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:07:52.271  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:07:52.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:52.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:52.273 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:52.273 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:52.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:52.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:52.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:07:52.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:07:52.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:07:52.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:07:52.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: d87e1bc668efe595d6fb46d0d7b05a2241ebc9155415348d79b1898317239366ee8e01c77e781fa5fee6dc995d80a31339ecb6d6df1dad88635b3aa2e290febe1cb93b25729d0a018f5d265f16f9744e8451d56e0372980bb84f9c8feffb0018fdc5920f53b7f621a4a8278880aaf4478e55074b917890304fff910fb24e9847b521661a5f7d5e0694868efaa1eb8f9aed40acd5a47aa7bb77b44e34b56951aa40cf25d7e0f3ce4bae63a691e0023192af8a2b28077cb00441c7d7bd711b61271def5985ed20383e4dc6a15d0a4299e0e52c4e196d257656d77c993ba88aa15b363ad2cdc719a09009e0698364162a5402883d50715f19fb635d8fe6a457059aa8db683f9f49203f2c7418f43b0030e213de0fcb6a69c3180fc786bf90ee38ab8be8a9a78fa450b47e3781bec21023e3327ec70fedf6aaefa186ec304798c8b6a145ff84a289aae87bb7bbfb63b16c1172cbf94ef4221eccf23b6c70dbaebb56690869dc5717a8c5023c850df9244d89ba0025901e8634f8cb47965911be3287
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:12:0b:58:ce:86:32:ed:0c:dc:a7:6e:8b:86:44:bc:43:1f:04:6f]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:08:26.449  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:08:26.452 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:08:26.455 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-28 09:08:26.457 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:08:26.458  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-28 09:08:26.459  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:08:26.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:08:26.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:08:26.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:08:26.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:08:26.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:08:26.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:08:26.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:08:26.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:08:26.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:08:26.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:08:26.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:08:26.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:08:26.632  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:08:26.633  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:08:26.633 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:08:26.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:08:26.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:08:26.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:08:26.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:08:26.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:08:26.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:08:26.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:08:26.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:08:26.641 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:08:26.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:66:05:ad:1a:8c:1b:ef:bb:07:48:7d:b6:68:14:32:c4:02:df:e8]
            modulus: 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
    public exponent: 10001

] 
2021-09-28 09:10:53.143  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-28 09:10:53.147 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-28 09:10:53.151 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-28 09:10:53.153 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-28 09:10:53.153  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-28 09:10:53.162  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-28 09:10:53.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-28 09:10:53.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-28 09:10:53.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-28 09:10:53.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-28 09:10:53.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-28 09:10:53.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:10:53.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-28 09:10:53.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:10:53.360  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-28 09:10:53.361  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-28 09:10:53.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-28 09:10:53.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-28 09:10:53.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-28 09:10:53.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-28 09:10:53.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:10:53.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:10:53.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:10:53.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:10:53.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:10:53.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:10:53.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-28 09:10:53.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-28 09:10:53.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-28 09:10:53.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-28 09:10:53.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 304696565695349654681105910174938691511390654236
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 28 06:38:52 UTC 2021
           Final Date: Sun Sep 28 06:38:51 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:f7:3f:ad:2f:fa:3b:19:2b:23:22:5b:97:6a:09:95:f7:05:0a:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c05811f6272ff88e02798864b88a67b6e24f23de
                       29831ecc35072806498ea51600285edbb44570cc
                       67d4f36955022c9f729a687aee9267fd96259e41
                       9168aeedee10187f054f2df77358837962c00c2c
                       605061b19cd94534914a2d5d0735cf1c258f3133
                       0d788ebe7461aa686bba5fd5515cf15c2fbea2b5
                       a310c45fef7a244aaf4c6a5aec8d07c6ca7b2375
                       e0a1bb094310878e4aced81eb46fde1305b0f740
                       a1e5b61725d1145da0d833a1cb14060460f386a4
                       03f9fcd925a0070f6735132031dd67fc16382309
                       54590f307de2a2ca82a999ef15d1b0d4d4aee125
                       8c4a9236965bfc36198a07cb4286ed15ed90c6c1
                       a8e312cdc8f7f5605e64f3fd53e7d60bd5f776c9
                       18ddb3c03f760d7c07d3a73237496626e7709c9a
                       48bafc38da97e92843c9967a76a26a3755d6304d
                       48b0fb5d6bd674c0e57d4be6647847140a9a14a3
                       8e727f92def3b3e5aee2956d2ae0ce0bff56b46a
                       0a153f616e22944b261bb2e1aaec55c834d6b8fd
                       60ae21ee90f9a3a178a7151f7750534048b5fa7f
                       0f5ca0f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:11:1c:91:59:98:79:36:12:b2:e4:3c:0f:75:43:ee:91:9f:e5:42]
            modulus: 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
    public exponent: 10001

]