Results

By type

          2021-10-30 05:11:43,711 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-30 05:11:44,507 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-30 05:11:45.287  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-30 05:11:48.184 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-30 05:11:48.415  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-30 05:11:48.544  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-30 05:11:50.686  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.66 seconds (JVM running for 9.516)
2021-10-30 05:12:55.713  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:12:55.723 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:12:55.762 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-30 05:12:55.766 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:12:55.783  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-30 05:12:55.788  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:12:55.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:12:55.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:12:55.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:12:55.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:12:55.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:12:55.811 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:12:55.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:12:55.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:12:55.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:12:55.865 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:12:56.529  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:12:56.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:12:56.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:12:56.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:12:56.547  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:12:56.548  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:12:56.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:12:56.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:12:56.551 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:12:56.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:12:56.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:12:56.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:12:56.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:12:56.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:12:56.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:12:56.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:12:56.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:47:b1:06:08:2a:cb:00:ad:90:0e:3d:8f:1e:c8:5a:79:f0:d6:64]
            modulus: cf99cafd82cbe868b772bb57511544e03647b9af6370d903d69b285984be8888388f907bbbe78b35d8c0bd8edb26368d3c5f5da92af48a7538c4268c0968a52583c8405aa6c23cb8e7a00599070b1fd3e075266294b654ae5d25beef24e32194e072fbae2f0730e42197a34c4f8173788b8d4be96ef62b51cba34d9a7d839c3f7880f47c5a881223bfacefceb521052f7cd8f309d0d709055740ee0a5991cbb63bd6549f59ec2c86c464c7420c9368681ce564d334cff3f779cc8ea0bd33547fe09cbd9d8b9865c37b393d2fb64872de5cb054e7e0111d9980a4693b4806e95dcec01bc93b73957245a00ee7dfa317e4dbee0ef62743d2e865fe32936e66686d
    public exponent: 10001

] 
2021-10-30 06:54:46.239  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 06:54:46.245 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 06:54:46.252 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-30 06:54:46.254 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 06:54:46.255  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-30 06:54:46.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 06:54:46.257  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 06:54:46.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 06:54:46.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 06:54:46.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 06:54:46.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 06:54:46.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:54:46.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:54:46.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:54:46.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 06:54:46.488  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 06:54:46.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 06:54:46.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:54:46.495  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 06:54:46.497  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 06:54:46.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:54:46.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:54:46.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:54:46.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:54:46.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:54:46.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:54:46.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:54:46.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:54:46.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:54:46.507 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 06:54:46.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:6d:8d:fe:03:eb:b2:86:20:0a:51:69:6d:15:8a:be:13:72:63:66]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 06:56:13.184  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 06:56:13.187 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 06:56:13.190 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 06:56:13.192 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 06:56:13.193  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 06:56:13.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 06:56:13.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 06:56:13.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 06:56:13.198 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 06:56:13.203 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 06:56:13.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 06:56:13.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:56:13.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:56:13.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:56:13.347  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 06:56:13.347  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 06:56:13.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 06:56:13.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:56:13.351  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 06:56:13.352  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 06:56:13.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:56:13.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:56:13.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:56:13.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:56:13.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:56:13.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:56:13.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:56:13.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:56:13.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:56:13.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 06:56:13.362 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: b8150cc978a0966fc3ef68858e7e0814aefed0a281179c10e2219444086e59e78ca9255c850524fe229460ed5f00354db07c1352fa8f0bfb96733646adfd469a56261189f3519fcede6324830f0e8f31e1614eaee540875260ca8a02ed720e8b8965ad2da1e2aa5e39efc21db39c21ac72798ab482e5a642afee7fdc391942ccb160dcd53196f712df3165b5edea6faeb50dd73f439521dea68d400d20f2b578b54eb05434921d38f6747d727bed930733f8aa7e14815a176c6b427470e24d49bf7639f05627ffa2b5e6059df670c20c0a2b078d1bebf28ec3a4cf95077250d838eab377e3112a3fd2dcc254aa978e510c84f87c632bedce8dba561af4f4cc9578d4f1853b84291ef9c2a8e8282bfa18f804a691d1d23011a0d8fc95ac594874496008306c335d4726c9c1a88a1b127ff33719d75c8a5792c755a4c7fe3df0db730e95ff9cd51b0384602c79561743b8acdf605dca572073b4c5484f68312186b11dd5c6ad7a36f9a4796d3daf4e584b0f85fce6ce2cacd0e524309f20fd7fd9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:70:ad:43:72:1a:ac:6f:16:73:ff:b3:10:74:6c:a9:f7:0b:fa:ee]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 06:57:45.092  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 06:57:45.106 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 06:57:45.110 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 06:57:45.112 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 06:57:45.113  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 06:57:45.114  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 06:57:45.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 06:57:45.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 06:57:45.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 06:57:45.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 06:57:45.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 06:57:45.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:57:45.127 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:57:45.128 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:57:45.323  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 06:57:45.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 06:57:45.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 06:57:45.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:57:45.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 06:57:45.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 06:57:45.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:57:45.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:57:45.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:57:45.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:57:45.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:57:45.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:57:45.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:57:45.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:57:45.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:57:45.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 06:57:45.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:df:f4:1b:af:f5:cf:37:0f:fd:2d:90:fe:39:be:c4:87:5f:23:e8]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 06:59:38.634  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 06:59:38.639 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 06:59:38.642 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 06:59:38.643 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 06:59:38.644  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 06:59:38.644  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 06:59:38.645  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 06:59:38.645 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 06:59:38.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 06:59:38.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 06:59:38.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 06:59:38.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:59:38.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:59:38.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:59:38.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 06:59:38.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 06:59:38.820 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 06:59:38.820 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:59:38.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 06:59:38.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 06:59:38.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:59:38.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:59:38.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:59:38.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:59:38.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:59:38.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:59:38.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:59:38.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:59:38.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:59:38.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 06:59:38.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:00:e9:db:61:15:18:e2:cb:b8:57:c3:0c:6a:f2:a9:93:44:bd:26]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 06:59:39.006  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 06:59:39.010 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 06:59:39.013 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-30 06:59:39.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 06:59:39.018  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-30 06:59:39.019  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 06:59:39.020  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 06:59:39.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 06:59:39.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 06:59:39.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 06:59:39.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 06:59:39.045 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:59:39.045 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 06:59:39.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:59:39.141  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 06:59:39.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 06:59:39.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 06:59:39.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 06:59:39.145  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 06:59:39.146  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 06:59:39.147 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:59:39.147 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:59:39.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:59:39.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:59:39.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:59:39.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:59:39.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 06:59:39.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 06:59:39.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 06:59:39.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 06:59:39.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: b8150cc978a0966fc3ef68858e7e0814aefed0a281179c10e2219444086e59e78ca9255c850524fe229460ed5f00354db07c1352fa8f0bfb96733646adfd469a56261189f3519fcede6324830f0e8f31e1614eaee540875260ca8a02ed720e8b8965ad2da1e2aa5e39efc21db39c21ac72798ab482e5a642afee7fdc391942ccb160dcd53196f712df3165b5edea6faeb50dd73f439521dea68d400d20f2b578b54eb05434921d38f6747d727bed930733f8aa7e14815a176c6b427470e24d49bf7639f05627ffa2b5e6059df670c20c0a2b078d1bebf28ec3a4cf95077250d838eab377e3112a3fd2dcc254aa978e510c84f87c632bedce8dba561af4f4cc9578d4f1853b84291ef9c2a8e8282bfa18f804a691d1d23011a0d8fc95ac594874496008306c335d4726c9c1a88a1b127ff33719d75c8a5792c755a4c7fe3df0db730e95ff9cd51b0384602c79561743b8acdf605dca572073b4c5484f68312186b11dd5c6ad7a36f9a4796d3daf4e584b0f85fce6ce2cacd0e524309f20fd7fd9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:2f:80:06:d9:87:02:93:b3:c6:d4:27:4d:4d:57:ef:b7:34:bc:a2]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 07:00:11.917  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 07:00:11.919 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 07:00:11.922 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-30 07:00:11.922 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 07:00:11.923  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-30 07:00:11.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 07:00:11.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 07:00:11.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 07:00:11.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 07:00:11.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 07:00:11.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 07:00:11.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 07:00:11.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 07:00:11.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 07:00:12.121  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 07:00:12.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 07:00:12.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 07:00:12.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 07:00:12.125  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 07:00:12.126  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 07:00:12.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:00:12.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:00:12.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:00:12.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:00:12.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:00:12.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:00:12.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:00:12.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:00:12.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:00:12.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 07:00:12.137 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:25:57:52:4d:d2:c5:a0:d6:0c:92:ca:7f:f3:50:a0:2a:c5:28:a7]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 07:00:44.140  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 07:00:44.143 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 07:00:44.147 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-30 07:00:44.148 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 07:00:44.149  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-30 07:00:44.150  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 07:00:44.151  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 07:00:44.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 07:00:44.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 07:00:44.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 07:00:44.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 07:00:44.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 07:00:44.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 07:00:44.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 07:00:44.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 07:00:44.303  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 07:00:44.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 07:00:44.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 07:00:44.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 07:00:44.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 07:00:44.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:00:44.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:00:44.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:00:44.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:00:44.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:00:44.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:00:44.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:00:44.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:00:44.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:00:44.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 07:00:44.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:3c:cf:9d:71:b6:d6:0c:d2:31:f7:5a:bb:40:ee:c0:16:bc:55:f6]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 07:02:50.707  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 07:02:50.716 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 07:02:50.719 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 07:02:50.720 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 07:02:50.722  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 07:02:50.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 07:02:50.725  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 07:02:50.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 07:02:50.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 07:02:50.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 07:02:50.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 07:02:50.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 07:02:50.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 07:02:50.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 07:02:50.995  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 07:02:50.996  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 07:02:50.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 07:02:50.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 07:02:50.999  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 07:02:51.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 07:02:51.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:02:51.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:02:51.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:02:51.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:02:51.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:02:51.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:02:51.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 07:02:51.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 07:02:51.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 07:02:51.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 07:02:51.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 587727612251691076418863645907798164580360283149
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 05:08:53 UTC 2021
           Final Date: Thu Oct 30 05:08:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:48:8a:70:82:a8:39:45:bb:56:b8:7a:2c:2a:e2:fa:58:82:23:c2]
            modulus: b8150cc978a0966fc3ef68858e7e0814aefed0a281179c10e2219444086e59e78ca9255c850524fe229460ed5f00354db07c1352fa8f0bfb96733646adfd469a56261189f3519fcede6324830f0e8f31e1614eaee540875260ca8a02ed720e8b8965ad2da1e2aa5e39efc21db39c21ac72798ab482e5a642afee7fdc391942ccb160dcd53196f712df3165b5edea6faeb50dd73f439521dea68d400d20f2b578b54eb05434921d38f6747d727bed930733f8aa7e14815a176c6b427470e24d49bf7639f05627ffa2b5e6059df670c20c0a2b078d1bebf28ec3a4cf95077250d838eab377e3112a3fd2dcc254aa978e510c84f87c632bedce8dba561af4f4cc9578d4f1853b84291ef9c2a8e8282bfa18f804a691d1d23011a0d8fc95ac594874496008306c335d4726c9c1a88a1b127ff33719d75c8a5792c755a4c7fe3df0db730e95ff9cd51b0384602c79561743b8acdf605dca572073b4c5484f68312186b11dd5c6ad7a36f9a4796d3daf4e584b0f85fce6ce2cacd0e524309f20fd7fd9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b21d21a3ee292f7e9d458314335ba8ed86e61d31
                       5b7637ef01bfcbbf463f81c8f232c40107fb15f4
                       9907d5379061cc330526fee551436ae05523225a
                       16842567948d2ae07c8aa0447bde212490544989
                       a240bf0c16a8b06f1007f232c9b0366fe69c3f3b
                       f7c0f8a2f6c2f237930b65b086e5d1c5a94f42fb
                       08d0ea934218681977e00e25a613b5e974019425
                       d0ade7f18ec202de0c22fcb789152b3577c9792b
                       b8410e5fbf6b57cd9099d77131a1352a2191ef06
                       8025f8c74c212645c38d2e9dab8207c4cea97164
                       7e63f237083336cb1dbc1d86b844ff87caacc874
                       3eb503a2a28eb3d63fa7e29b0848262854d4bdf7
                       1fa539ac324e95c895f6720670c33bab2a7872c4
                       132ea1bed735b053907f19d26c20f301ca255bd9
                       6f4a2a07b7e23678f79c875191b542a935f271e4
                       62c5321b8be5e30bee82ce11e232e8ecd1771b8d
                       f0c37ea0622e2abb26a4056bfa8b096da4ececcf
                       62883e2b95724ec071a72d7fe5a7318e102d0bdb
                       16bcfa0f241b943eb7feac760283e4b771e3d6cd
                       aafce844
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:a9:8e:0c:ab:27:f7:8f:73:98:46:5c:eb:c4:4c:c5:54:a2:90:22]
            modulus: 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
    public exponent: 10001

]