Results

By type

          2021-11-05 10:06:34,947 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-05 10:06:35,791 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-05 10:06:36.865  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-05 10:06:40.285 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-05 10:06:40.574  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-05 10:06:40.715  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-05 10:06:42.821  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.576 seconds (JVM running for 10.259)
2021-11-05 10:07:22.583  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 10:07:22.606 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 10:07:22.671 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-05 10:07:22.685 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 10:07:22.718  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-05 10:07:22.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 10:07:22.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 10:07:22.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 10:07:22.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 10:07:22.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 10:07:22.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 10:07:22.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 10:07:22.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 10:07:22.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 10:07:22.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 10:07:22.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 10:07:23.511  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 10:07:23.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 10:07:23.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 10:07:23.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 10:07:23.528  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 10:07:23.529  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 10:07:23.530 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 10:07:23.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 10:07:23.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 10:07:23.544 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 10:07:23.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 10:07:23.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 10:07:23.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 10:07:23.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 10:07:23.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 10:07:23.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 10:07:23.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:25:82:27:3a:95:ae:4b:d2:b1:6a:d6:01:7c:c1:11:0d:d5:0b:f2]
            modulus: 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
    public exponent: 10001

] 
2021-11-05 12:01:24.097  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:01:24.099 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:01:24.102 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-05 12:01:24.103 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:01:24.104  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-05 12:01:24.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:01:24.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:01:24.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:01:24.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:01:24.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:01:24.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:01:24.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:01:24.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:01:24.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:01:24.294  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:01:24.296  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:01:24.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:01:24.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:01:24.300  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:01:24.300  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:01:24.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:01:24.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:01:24.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:01:24.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:01:24.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:01:24.304 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:01:24.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:01:24.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:01:24.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:01:24.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:01:24.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:a3:0e:c7:22:ee:ad:76:d4:b3:43:52:57:b6:3f:4b:51:79:ed:5b]
            modulus: 9ab3d425a8455e59c5c9668a17590391f9d477f05a78a17d87728a8432d91eb3f7a4c38b2d09825f787c5828af8cd12b6e66c4da768055be9b7af6a98cec58754b0997073228684d012eb241c237edd32d85338c97e31d7543ac901def0dcbae595b93da19e289e96f9908b3231fe5110dd26917c4fc90a03adf4bcbf89c7bcd4eb3b967dc16481bee05588bc88846ea11a606b001aca2793eed8517797dc0fa94a3197f1dc556c30c6a16a2db11e6ab080ed0a79d129ca43a9dfef5d14d13779e8646f7c948ce2cb817a93c9911d99a08f32a486a044c4a4c681f45886cf81fc265a97090ca628a32f06057ded02406a0f512a51db31733a8691f35d56c5635
    public exponent: 10001

] 
2021-11-05 12:04:38.124  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:04:38.127 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:04:38.130 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-05 12:04:38.131 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:04:38.132  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-05 12:04:38.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:04:38.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:04:38.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:04:38.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:04:38.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:04:38.150 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:04:38.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:04:38.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:04:38.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:04:38.307  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:04:38.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:04:38.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:04:38.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:04:38.311  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:04:38.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:04:38.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:04:38.313 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:04:38.313 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:04:38.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:04:38.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:04:38.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:04:38.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:04:38.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:04:38.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:04:38.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:04:38.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:52:89:26:d3:ee:7a:95:44:b5:62:be:68:5c:c8:81:0f:19:9f:15]
            modulus: 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
    public exponent: 10001

] 
2021-11-05 12:05:58.837  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:05:58.840 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:05:58.843 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-05 12:05:58.843 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:05:58.844  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-05 12:05:58.845  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:05:58.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:05:58.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:05:58.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:05:58.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:05:58.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:05:58.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:05:58.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:05:58.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:05:59.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:05:59.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:05:59.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:05:59.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:05:59.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:05:59.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:05:59.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:05:59.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:05:59.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:05:59.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:05:59.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:05:59.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:05:59.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:05:59.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:05:59.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:05:59.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:05:59.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:a7:21:f3:15:c1:3b:be:33:1b:33:1a:99:56:7b:96:5f:7d:6f:65]
            modulus: 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
    public exponent: 10001

] 
2021-11-05 12:06:10.051  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:06:10.053 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:06:10.054 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-05 12:06:10.055 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:06:10.055  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-05 12:06:10.056  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:06:10.056  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:06:10.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:06:10.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:06:10.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:06:10.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:06:10.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:06:10.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:06:10.063 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:06:10.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:06:10.188  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:06:10.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:06:10.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:06:10.191  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:06:10.192  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:06:10.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:06:10.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:06:10.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:06:10.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:06:10.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:06:10.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:06:10.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:06:10.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:06:10.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:06:10.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:06:10.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:16:8a:79:8f:bc:6a:a8:61:c5:6b:8a:87:f0:d3:8e:08:15:b1:4f]
            modulus: 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
    public exponent: 10001

] 
2021-11-05 12:06:30.587  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:06:30.589 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:06:30.590 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-05 12:06:30.591 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:06:30.592  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-05 12:06:30.593  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:06:30.594  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:06:30.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:06:30.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:06:30.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:06:30.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:06:30.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:06:30.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:06:30.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:06:30.747  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:06:30.748  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:06:30.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:06:30.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:06:30.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:06:30.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:06:30.751 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:06:30.751 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:06:30.751 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:06:30.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:06:30.753 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:06:30.753 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:06:30.754 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:06:30.754 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:06:30.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:06:30.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:06:30.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: da3af31914f53cc6628636631b46b3707541069d3de156c9c14475438afd04deb459ade7602d4b23620a35af980344aba73a2ff92a4d9d094ea0483a20d0334f19621a870c08b1151f76d433e2832c63fdaa255a6fae36d73897ca775b7f2495ab80bdc0950d3f1cf36f7452a67e15c17e57e4dbc6b64501e2438bad45309cc07886ea565dfb7556300034989fcd1162b3c92f73094c3f2bb768ef84589346b6ca1ae835a368180ea8c71b0909871adab9e7ecb9ceef8366c2cadff364acd40008607cf28638dd493736aeb8acb158159ca9630baa0f680644463968eeaffe5fdfa60223740f2e231be5de73bfc473fc9198178366a178a4f7641ad8e7068163eb0f88496c957eed38b61a2b244f1ce1c79de86007de330ba810298828e87c6ac07f20ff684f93c35a269cf027c621a74488c5b1929d88163f8b8a1fc3d0df78adda9b9b90b078bc31ab83f6baeb3667b876c938589904edcca0cd90d783740bdb28024eb4260f90f7b17c8a34de4c38d113ce9b5f5722f18b29e7c750fa5921
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:91:21:4e:e3:5a:89:67:02:00:84:38:e6:84:0f:da:f2:d7:0c:b2]
            modulus: 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
    public exponent: 10001

] 
2021-11-05 12:07:07.171  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:07:07.172 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:07:07.174 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-05 12:07:07.175 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:07:07.175  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-05 12:07:07.176  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:07:07.177  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:07:07.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:07:07.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:07:07.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:07:07.182 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:07:07.183 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:07:07.183 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:07:07.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:07:07.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:07:07.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:07:07.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:07:07.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:07:07.288  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:07:07.288  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:07:07.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:07:07.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:07:07.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:07:07.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:07:07.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:07:07.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:07:07.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:07:07.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:07:07.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:07:07.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:07:07.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:3c:b9:a7:cd:18:ef:cd:8e:60:97:b9:2b:bd:85:65:ee:bf:80:8d]
            modulus: 96b28697914a9a6be0db24ba8acb5b59b30f2c08e0b98ffa844ce6f3c02d1dd9b58b916059fa38f2f047bd028a6af701909dc9aeac2463c98d246440bf771604704e83bda0bc0dd7635cc328675423ee1995bb536729acf20e316a573dba74156bf87e96d6431b147095b71a0ee4a9f8c94543bd819d63ef151cfdd7cab6c56392446fefe82d949fab5f89b11a00ab9c61e9d68ec1e595f6ba4f9a7cae098fa5d4f858176a7832ffeeb2c9a8bef6136347c737eacebf46fa95e7951bd46b99338fa2f5b0815d1cfa9b8339e2101369af71a2d05eeedb1ec8c01de41a2cf24e30b2e655386f89ae1d3c34b4752a42c18c8579f37c707b2dd09c964965d756fdbb
    public exponent: 10001

] 
2021-11-05 12:08:25.300  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:08:25.302 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:08:25.307 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-05 12:08:25.308 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:08:25.308  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-05 12:08:25.309  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:08:25.310  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:08:25.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:08:25.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:08:25.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:08:25.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:08:25.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:08:25.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:08:25.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:08:25.474  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:08:25.475  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:08:25.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:08:25.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:08:25.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:08:25.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:08:25.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:08:25.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:08:25.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:08:25.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:08:25.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:08:25.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:08:25.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:08:25.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:08:25.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:08:25.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:08:25.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:da:b4:0d:56:47:b5:2b:7d:c0:96:ed:eb:5e:88:07:df:18:b3:a8]
            modulus: f3a11102efedf02929f9913fa1b43e289f51bad1c4e1d1e13171e5a21b8b26f7ef36fc2e9e971614e76f7a2cbd6e3de6a0fd5cfd1e2161c352c597cacf555c68b27f17fe1eea97a20ea1291aa8a99988c4dd6f2aef07b2e44d67bbc209de14c20e30251f23549a06501888f696a5c7c7bc327f57510a83c00895f965a6fe826174d8aa34fd58c86b53e790f49c4779a05f3a0ae7247ba7a32248c528f8eb96cdef00b253017336461098f98347725957ddec718b27788621f2875528e7e331eb3c6e7e8ea3398c7fb404b63159d7f489bd6975b5b046f1c46d0a2d817a7338be8ae7375ae0da7f1efb29681b2f65d9809cd42a7accadfb4576107f60d3b410e5
    public exponent: 10001

] 
2021-11-05 12:08:50.910  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-05 12:08:50.911 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-05 12:08:50.913 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-05 12:08:50.913 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-05 12:08:50.914  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-05 12:08:50.915  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-05 12:08:50.915  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-05 12:08:50.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-05 12:08:50.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-05 12:08:50.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-05 12:08:50.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-05 12:08:50.922 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:08:50.922 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-05 12:08:50.922 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:08:51.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-05 12:08:51.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-05 12:08:51.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-05 12:08:51.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-05 12:08:51.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-05 12:08:51.026  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-05 12:08:51.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:08:51.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:08:51.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:08:51.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:08:51.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:08:51.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:08:51.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-05 12:08:51.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-05 12:08:51.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-05 12:08:51.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-05 12:08:51.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 527925446892117646957475581253424097238858173622
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 05 10:03:27 UTC 2021
           Final Date: Wed Nov 05 10:03:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03
                       5988db1b68fb6d7f70b8c75041508fcc32219248
                       dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf
                       67040f887b91204092ec110fcdef5a6aa9c51f3c
                       04572a9750b251036507b6995d5561cf905cc644
                       637bf20c7e99ebe0b7c3bab67ef17448a1204826
                       4ff565eac7e5a1484ecd223e5a8bd4f5356626a9
                       184c5eb6bad99c80595dd856b107f96c092efbb5
                       8302876fbcf20b34518463f1d2b9b8d1afd1d04c
                       ffb2d54ab8b674ec45768a4c5d9249e02887fa01
                       8f586aeb333f863c05b8b80a851e5d99e24efa90
                       bc42d792bd8b93c4fa135fe426a84ea80d65c2ec
                       69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba
                       df618beec416d03ff1ad9bcd7c3536f842f4fc56
                       5a085c432523c42143a88d135351f92a68aa2196
                       7ed545f08b439bd2205dd71374702183b6793dd9
                       f7c174a6ac01d5099283b3cc57472ae0992e723e
                       b658699cca4078859c6f72e7f2be2943e647ea7d
                       f51efc467c9f05aadc315aae6cc43c65c02d6761
                       cc4e26d9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:b8:d1:16:09:ab:ef:ae:05:ab:b2:b1:23:a9:ec:1e:a5:c5:d7:29]
            modulus: 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
    public exponent: 10001

]