Results

By type

          2021-10-22 10:08:45,707 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-22 10:08:46,597 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-22 10:08:47.417  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-22 10:08:50.487 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-22 10:08:50.758  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-22 10:08:50.909  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-22 10:08:53.175  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.046 seconds (JVM running for 9.79)
2021-10-22 10:10:38.383  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 10:10:38.400 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 10:10:38.464 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-22 10:10:38.474 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 10:10:38.503  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-22 10:10:38.508  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 10:10:38.510  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 10:10:38.512 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 10:10:38.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 10:10:38.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 10:10:38.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 10:10:38.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 10:10:38.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 10:10:38.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 10:10:38.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 10:10:38.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 10:10:39.227  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 10:10:39.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 10:10:39.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 10:10:39.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 10:10:39.244  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 10:10:39.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 10:10:39.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 10:10:39.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 10:10:39.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 10:10:39.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 10:10:39.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 10:10:39.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 10:10:39.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 10:10:39.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 10:10:39.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 10:10:39.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 10:10:39.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: dc67faadf0d67a8f13cc56f231d88f96d9e540fd7f74a598db199dadbdad3d49cfbe40d86880f4b13319bb0d255727fe33464cb99370f061b740563ebfe01acda36c83d6bcc835a4942daff24717cb98a3ae234017883d1a4b20dfefd17fc695f4e5e6ddefc188192787ecb62983f6c3019b28b537ecdbe06824fe33c7597f72b23eef89dbaf49de165336ee9eb3a53393cf463c9efccfdaf2fca6c7b6a8682c36f8775bf5cbc6617bb6b3fe01991cf2b102d594df72033d7c6f86b1ba7f99798e87f077a963f5162ff81a4f8d26ba218a0f62680eca698fca4e05147f8cce4aff47c7fc238586100fd520374a3356c5f045ba8060be26953827a0ee1231a4865e2f1116e58aa7910b5bf89c3d7796e07302f18b8f0797b02212343a304dadeeba9415b8b4c52e740e8422c621caa4ed602e516867b29003839a0aa57cab59200bf2504080f8c56492e4337b43f04e4fdada03e23b3f895044775215335853e6879be84c70c5540f80e5b6e3aec3c6b0c53d2d8bed41d6f8049085af455a5fff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:49:27:7c:76:96:97:5e:a2:53:64:c3:fe:ad:d9:f5:45:24:5f:d1]
            modulus: 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
    public exponent: 10001

] 
2021-10-22 12:07:52.383  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:07:52.386 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:07:52.389 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-22 12:07:52.391 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:07:52.392  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-22 12:07:52.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:07:52.394  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:07:52.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:07:52.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:07:52.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:07:52.403 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:07:52.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:07:52.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:07:52.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:07:52.624  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:07:52.625  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:07:52.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:07:52.627 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:07:52.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:07:52.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:07:52.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:07:52.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:07:52.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:07:52.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:07:52.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:07:52.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:07:52.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:07:52.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:07:52.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:07:52.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:07:52.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: dc67faadf0d67a8f13cc56f231d88f96d9e540fd7f74a598db199dadbdad3d49cfbe40d86880f4b13319bb0d255727fe33464cb99370f061b740563ebfe01acda36c83d6bcc835a4942daff24717cb98a3ae234017883d1a4b20dfefd17fc695f4e5e6ddefc188192787ecb62983f6c3019b28b537ecdbe06824fe33c7597f72b23eef89dbaf49de165336ee9eb3a53393cf463c9efccfdaf2fca6c7b6a8682c36f8775bf5cbc6617bb6b3fe01991cf2b102d594df72033d7c6f86b1ba7f99798e87f077a963f5162ff81a4f8d26ba218a0f62680eca698fca4e05147f8cce4aff47c7fc238586100fd520374a3356c5f045ba8060be26953827a0ee1231a4865e2f1116e58aa7910b5bf89c3d7796e07302f18b8f0797b02212343a304dadeeba9415b8b4c52e740e8422c621caa4ed602e516867b29003839a0aa57cab59200bf2504080f8c56492e4337b43f04e4fdada03e23b3f895044775215335853e6879be84c70c5540f80e5b6e3aec3c6b0c53d2d8bed41d6f8049085af455a5fff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:b9:1b:ea:88:f6:15:b7:52:78:4e:6b:27:1b:26:3e:38:2d:20:7c]
            modulus: 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
    public exponent: 10001

] 
2021-10-22 12:09:37.359  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:09:37.363 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:09:37.380 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-22 12:09:37.382 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:09:37.383  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-22 12:09:37.390  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:09:37.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:09:37.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:09:37.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:09:37.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:09:37.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:09:37.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:09:37.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:09:37.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:09:37.584  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:09:37.585  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:09:37.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:09:37.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:09:37.594  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:09:37.594  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:09:37.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:09:37.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:09:37.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:09:37.603 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:09:37.604 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:09:37.604 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:09:37.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:09:37.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:09:37.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:09:37.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:09:37.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:d4:d2:69:84:4e:f5:6f:d6:68:14:58:9c:5d:18:02:61:b8:23:8d]
            modulus: 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
    public exponent: 10001

] 
2021-10-22 12:11:10.611  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:11:10.614 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:11:10.618 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-22 12:11:10.619 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:11:10.620  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-22 12:11:10.621  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:11:10.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:11:10.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:11:10.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:11:10.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:11:10.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:11:10.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:11:10.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:11:10.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:11:10.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:11:10.792  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:11:10.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:11:10.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:11:10.797  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:11:10.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:11:10.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:11:10.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:11:10.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:11:10.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:11:10.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:11:10.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:11:10.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:11:10.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:11:10.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:11:10.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:11:10.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:40:4a:f9:4c:cc:64:0b:c0:01:2e:e4:63:19:ef:ba:47:a1:b0:00]
            modulus: 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
    public exponent: 10001

] 
2021-10-22 12:12:30.753  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:12:30.756 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:12:30.759 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-22 12:12:30.761 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:12:30.761  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-22 12:12:30.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:12:30.763  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:12:30.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:12:30.764 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:12:30.764 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:12:30.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:12:30.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:12:30.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:12:30.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:12:30.978  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:12:30.979  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:12:30.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:12:30.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:12:30.982  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:12:30.987  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:12:30.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:12:30.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:12:30.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:12:30.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:12:30.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:12:30.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:12:30.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:12:30.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:12:30.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:12:30.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:12:30.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: dc67faadf0d67a8f13cc56f231d88f96d9e540fd7f74a598db199dadbdad3d49cfbe40d86880f4b13319bb0d255727fe33464cb99370f061b740563ebfe01acda36c83d6bcc835a4942daff24717cb98a3ae234017883d1a4b20dfefd17fc695f4e5e6ddefc188192787ecb62983f6c3019b28b537ecdbe06824fe33c7597f72b23eef89dbaf49de165336ee9eb3a53393cf463c9efccfdaf2fca6c7b6a8682c36f8775bf5cbc6617bb6b3fe01991cf2b102d594df72033d7c6f86b1ba7f99798e87f077a963f5162ff81a4f8d26ba218a0f62680eca698fca4e05147f8cce4aff47c7fc238586100fd520374a3356c5f045ba8060be26953827a0ee1231a4865e2f1116e58aa7910b5bf89c3d7796e07302f18b8f0797b02212343a304dadeeba9415b8b4c52e740e8422c621caa4ed602e516867b29003839a0aa57cab59200bf2504080f8c56492e4337b43f04e4fdada03e23b3f895044775215335853e6879be84c70c5540f80e5b6e3aec3c6b0c53d2d8bed41d6f8049085af455a5fff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:77:cd:74:8d:92:f3:97:6b:1e:6d:84:bd:f9:c8:86:33:91:3b:e1]
            modulus: f3fee344a912d3fbd2669342419128e096ae3faee00e84fb2120b530b45d890c71f414ec4958a184b173211eb8f6c0049c7076f3dbd3896321ef5035087a823655092d3c196995853620888a6bdacc8c818a5230b5e87f333ba3fef3755923ade79f1cafb429adf38b59b5840711455d3f858614349b1f93b0c05da9b78b2fcbd695ea7430fdd062ea061a9ad73822301a64ef9d68d2c6eca8c59762113f3fbdc41ce3398bd00106f6e5c76af747d0c746f725442107089372d9081a5902a02f5ba101af66537535414b8b9840d91c502319ca724f9a56e32843460765bc20ab041567be7d38c7f7a3ad3a0529b871a04cd940269705d7dbb239b36a89a80c23
    public exponent: 10001

] 
2021-10-22 12:13:02.289  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:13:02.291 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:13:02.293 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-22 12:13:02.294 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:13:02.294  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-22 12:13:02.295  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:13:02.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:13:02.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:13:02.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:13:02.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:13:02.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:13:02.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:13:02.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:13:02.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:13:02.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:13:02.485  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:13:02.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:13:02.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:13:02.489  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:13:02.489  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:13:02.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:02.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:02.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:02.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:02.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:02.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:02.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:02.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:02.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:02.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:13:02.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: dc67faadf0d67a8f13cc56f231d88f96d9e540fd7f74a598db199dadbdad3d49cfbe40d86880f4b13319bb0d255727fe33464cb99370f061b740563ebfe01acda36c83d6bcc835a4942daff24717cb98a3ae234017883d1a4b20dfefd17fc695f4e5e6ddefc188192787ecb62983f6c3019b28b537ecdbe06824fe33c7597f72b23eef89dbaf49de165336ee9eb3a53393cf463c9efccfdaf2fca6c7b6a8682c36f8775bf5cbc6617bb6b3fe01991cf2b102d594df72033d7c6f86b1ba7f99798e87f077a963f5162ff81a4f8d26ba218a0f62680eca698fca4e05147f8cce4aff47c7fc238586100fd520374a3356c5f045ba8060be26953827a0ee1231a4865e2f1116e58aa7910b5bf89c3d7796e07302f18b8f0797b02212343a304dadeeba9415b8b4c52e740e8422c621caa4ed602e516867b29003839a0aa57cab59200bf2504080f8c56492e4337b43f04e4fdada03e23b3f895044775215335853e6879be84c70c5540f80e5b6e3aec3c6b0c53d2d8bed41d6f8049085af455a5fff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:93:d4:d6:85:72:94:e9:1d:46:8d:6e:a8:5c:41:29:64:13:b6:f9]
            modulus: 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
    public exponent: 10001

] 
2021-10-22 12:13:37.215  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:13:37.216 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:13:37.219 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-22 12:13:37.219 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:13:37.220  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-22 12:13:37.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:13:37.221  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:13:37.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:13:37.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:13:37.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:13:37.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:13:37.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:13:37.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:13:37.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:13:37.396  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:13:37.397  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:13:37.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:13:37.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:13:37.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:13:37.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:13:37.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:37.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:37.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:37.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:37.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:37.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:37.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:37.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:37.406 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:37.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:13:37.410 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:a8:66:e3:50:6c:c5:48:8f:a3:45:83:14:f6:bd:df:3f:0e:4e:e3]
            modulus: b95100e40e4d925130ba1c7757fb4ed28967ed4385bfad2ae127645e0d807b77658b0fe1666c05e3635919c4e30d8f757130cfd9662de6df5ca2e10e2889c8a258bd1be852fc53cc956cf4199b9de3db899b46306e77aa7df501ce5960c7e7da4548bac83eb61fa33160748bf075e4ecf17f6295c4b30e1d66f692fb168c50d3a7c755b11192c1864968aff6232fde863839c4fcdd3edd15dd558ff743c8d6f0f0597404238d4cd841d4033497f53b6229f77aa439b368261db91fa8ab8a003740422712a5a123f33f08219716383c8b3c35c260a9ce36aa5147ed17167cd21fc45b94428d97ad0fa84f6d726820d1ce5182d0fc8b82a42270068c9037643d71
    public exponent: 10001

] 
2021-10-22 12:13:44.814  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:13:44.816 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:13:44.818 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-22 12:13:44.819 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:13:44.819  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-22 12:13:44.820  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:13:44.821  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:13:44.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:13:44.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:13:44.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:13:44.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:13:44.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:13:44.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:13:44.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:13:44.927  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:13:44.927  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:13:44.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:13:44.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:13:44.929  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:13:44.930  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:13:44.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:44.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:44.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:44.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:44.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:44.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:44.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:13:44.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:13:44.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:13:44.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:13:44.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:67:82:64:02:ed:ab:18:94:7a:c3:b7:40:3c:f5:c3:4b:60:69:6f]
            modulus: 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
    public exponent: 10001

] 
2021-10-22 12:15:22.121  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-22 12:15:22.125 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-22 12:15:22.127 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-22 12:15:22.127 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-22 12:15:22.128  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-22 12:15:22.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-22 12:15:22.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-22 12:15:22.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-22 12:15:22.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-22 12:15:22.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-22 12:15:22.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-22 12:15:22.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:15:22.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-22 12:15:22.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:15:22.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-22 12:15:22.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-22 12:15:22.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-22 12:15:22.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-22 12:15:22.308  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-22 12:15:22.308  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-22 12:15:22.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:15:22.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:15:22.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:15:22.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:15:22.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:15:22.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:15:22.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-22 12:15:22.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-22 12:15:22.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-22 12:15:22.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-22 12:15:22.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556791556535062393148729445442833592911244612816
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 22 10:02:07 UTC 2021
           Final Date: Wed Oct 22 10:02:06 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:8f:e2:ec:51:03:0c:50:55:fc:ab:d6:81:39:d7:c6:8b:3d:3e:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22693a71c4781eda9398c39a0ccee2069846d540
                       bfa769a66f7d5e17dcbd501be92cd1ecb84b70a0
                       308fa8e3a9d5004ae7561dae58179cf8a7181f0c
                       e63002fe7ee2cd73942477d2e2adc1f6bd43c975
                       42c23feefef532736b67626bcb6bc229e9870c15
                       8d0a898f6f255fe42af8935c450c9b84fb0fd2ac
                       71819f854488f5c2f9ea8d80a8872c37a766e295
                       0e71580ba2ce43d5c42f8728817124fc233eda1e
                       c4cb579043f33f9075f6c078061508d4f881b164
                       2f008f8880567fffc34ec5983ca6e947b1e77422
                       4e0072b4864f215f9c57d0627e3bf955c49f3a60
                       9f5540995d3a452362770c770b866c6155400257
                       28200663730ed00389e54d86116072474e9da782
                       ac3fcc58c2ce325684aac9502144bac5763cd41f
                       6d3b5c6fe41ea667bed8fe2e2ab33550118b87f5
                       23ca9f548c51a44e8c82b74b374528c9118a4e64
                       5eac7d85770f6a9cb84a668cec7aa68ef394fd58
                       fe9773847537d1643c7f4ff2e83410568af62262
                       fc86587f3b9b6d485d1b5cf891275f98298eebe5
                       1f58beff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:54:fb:f8:ce:bc:54:69:e1:94:1d:16:57:73:54:37:53:5a:a5:ee]
            modulus: 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
    public exponent: 10001

]