Results

By type

          2021-11-11 09:28:53,926 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-11 09:28:54,845 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-11 09:28:55.670  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-11 09:28:58.800 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-11 09:28:59.054  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-11 09:28:59.223  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-11 09:29:01.568  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.369 seconds (JVM running for 10.634)
2021-11-11 09:29:50.121  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 09:29:50.144 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 09:29:50.219 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-11 09:29:50.226 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 09:29:50.260  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-11 09:29:50.265  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 09:29:50.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 09:29:50.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 09:29:50.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 09:29:50.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 09:29:50.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 09:29:50.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 09:29:50.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 09:29:50.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 09:29:50.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 09:29:50.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 09:29:51.043  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 09:29:51.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 09:29:51.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 09:29:51.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 09:29:51.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 09:29:51.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 09:29:51.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 09:29:51.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 09:29:51.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 09:29:51.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 09:29:51.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 09:29:51.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 09:29:51.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 09:29:51.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 09:29:51.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 09:29:51.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 09:29:51.128 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: cdccf8a60011faba1cc3208d1d416475f793ba9eda19484a2703050ea777d74991021b27afaa64e1f6cd9d5526c04cbe6a5f959d5a4912683ca5311bf58e8dfa509885e999a458216b9430bf205c15ff2ac2ae7565f2447504bd45654cd4d34755e5aec28d3f616d9631cd1364ab5ef66334ada58982db8ced27839239eb275023b5b7f2d4e976618daaf7215209bb0f58be2a494146a4523ee29284d721678e4478c052430d798c9ed4bd3d701e99f17b843053879f080bfd3b6998ff1902cac31421e4405ee85309ce1dc5a748f61b0cd4bc6c4813a16da30222fa222ab8b9e82043a36d706ee80a7b7683fdd5591501dba7ced782d517c361efcb5c45b74ebd2aa7836cff4fb3b43f95b823a542bb66677c395f020a3461f2a4a7bb918af39dbdfe6c6be0a7d94c84c5b1ec1738bd6e6a56631b8f2a659f72fd5bec4330955ff502b528d02ec2757ad82d737a73ae342819fb40cb51d98d4b5b4593bf8c8f7b7b5806fd1d5af2a95726f3b8fd72bdc0b963733473fd2b6ac2f55b264306e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:e2:33:78:52:33:8b:e4:2d:5c:e5:6b:2d:8e:87:3c:87:b4:b6:85]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:26:47.510  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:26:47.515 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:26:47.519 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-11 11:26:47.521 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:26:47.523  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-11 11:26:47.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:26:47.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:26:47.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:26:47.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:26:47.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:26:47.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:26:47.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:26:47.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:26:47.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:26:47.688  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:26:47.689  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:26:47.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:26:47.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:26:47.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:26:47.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:26:47.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:26:47.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:26:47.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:26:47.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:26:47.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:26:47.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:26:47.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:26:47.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:26:47.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:26:47.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:26:47.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:f0:c8:ca:c7:dc:5b:3b:72:39:49:db:1c:71:9f:57:6f:24:d5:6a]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:31:00.016  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:31:00.020 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:31:00.023 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-11 11:31:00.025 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:31:00.026  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-11 11:31:00.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:31:00.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:31:00.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:31:00.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:31:00.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:31:00.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:31:00.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:31:00.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:31:00.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:31:00.208  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:31:00.209  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:31:00.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:31:00.210 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:31:00.212  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:31:00.213  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:31:00.214 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:00.214 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:00.214 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:00.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:00.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:00.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:00.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:00.218 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:00.218 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:00.220 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:31:00.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:17:f0:02:eb:92:77:83:dc:a5:d0:db:cd:09:30:1b:d9:e9:82:7f]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:31:21.846  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:31:21.848 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:31:21.850 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-11 11:31:21.850 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:31:21.851  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-11 11:31:21.852  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:31:21.852  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:31:21.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:31:21.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:31:21.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:31:21.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:31:21.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:31:21.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:31:21.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:31:21.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:31:21.987  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:31:21.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:31:21.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:31:21.992  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:31:21.993  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:31:21.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:21.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:21.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:21.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:21.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:21.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:21.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:21.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:21.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:21.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:31:22.003 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: cdccf8a60011faba1cc3208d1d416475f793ba9eda19484a2703050ea777d74991021b27afaa64e1f6cd9d5526c04cbe6a5f959d5a4912683ca5311bf58e8dfa509885e999a458216b9430bf205c15ff2ac2ae7565f2447504bd45654cd4d34755e5aec28d3f616d9631cd1364ab5ef66334ada58982db8ced27839239eb275023b5b7f2d4e976618daaf7215209bb0f58be2a494146a4523ee29284d721678e4478c052430d798c9ed4bd3d701e99f17b843053879f080bfd3b6998ff1902cac31421e4405ee85309ce1dc5a748f61b0cd4bc6c4813a16da30222fa222ab8b9e82043a36d706ee80a7b7683fdd5591501dba7ced782d517c361efcb5c45b74ebd2aa7836cff4fb3b43f95b823a542bb66677c395f020a3461f2a4a7bb918af39dbdfe6c6be0a7d94c84c5b1ec1738bd6e6a56631b8f2a659f72fd5bec4330955ff502b528d02ec2757ad82d737a73ae342819fb40cb51d98d4b5b4593bf8c8f7b7b5806fd1d5af2a95726f3b8fd72bdc0b963733473fd2b6ac2f55b264306e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:41:8c:d0:fb:d4:27:16:4c:be:d5:01:5b:04:16:4f:d2:ed:88:63]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:31:54.376  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:31:54.377 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:31:54.379 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-11 11:31:54.380 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:31:54.381  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-11 11:31:54.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:31:54.383  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:31:54.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:31:54.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:31:54.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:31:54.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:31:54.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:31:54.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:31:54.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:31:54.521  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:31:54.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:31:54.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:31:54.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:31:54.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:31:54.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:31:54.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:54.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:54.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:54.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:54.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:54.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:54.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:31:54.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:31:54.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:31:54.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:31:54.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:9f:0f:08:5b:a5:40:aa:5b:46:d1:2f:61:59:57:19:2d:94:59:57]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:32:29.282  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:32:29.284 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:32:29.287 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-11 11:32:29.288 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:32:29.288  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-11 11:32:29.289  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:32:29.290  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:32:29.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:32:29.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:32:29.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:32:29.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:32:29.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:32:29.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:32:29.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:32:29.451  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:32:29.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:32:29.452 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:32:29.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:32:29.454  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:32:29.455  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:32:29.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:32:29.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:32:29.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:32:29.457 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:32:29.457 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:32:29.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:32:29.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:32:29.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:32:29.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:32:29.460 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:32:29.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:4b:93:be:7f:9e:60:6f:50:94:4b:73:f5:a4:2c:21:06:2d:fc:f9]
            modulus: c5463d2055cad77299aaf0edf0aedb1ac9775b546d1e174528e02da7286638869a90c302af8e19d37c3824346cc7c36eae26613cbb6bcd0cb937ec0add8b1c84648454d252911889fbddf2451125bb5700af9b3e07cc08e61ca949be92a6fb7d52338005018338099e8acffe60751997793cbaebca4d38e7fc6081828519237f2444b775b2faf27a27638fc738127868f4df349a10a9b2c94ab1d5889830bc50ecdd394f02267530257b992ef07725219cc78faa1c748bcdefef516b36972a2793615d523c65096a381d89f3c5730e8ec1219c955af6584d4de3d6b3860e8e665a0d06779b6475f5a1ee7834d4075b19d9680b2ad4b1ea4febe45a0d8766ca65
    public exponent: 10001

] 
2021-11-11 11:32:33.377  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:32:33.379 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:32:33.380 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-11 11:32:33.381 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:32:33.382  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-11 11:32:33.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:32:33.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:32:33.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:32:33.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:32:33.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:32:33.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:32:33.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:32:33.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:32:33.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:32:33.493  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:32:33.494  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:32:33.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:32:33.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:32:33.496  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:32:33.497  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:32:33.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:32:33.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:32:33.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:32:33.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:32:33.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:32:33.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:32:33.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:32:33.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:32:33.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:32:33.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:32:33.506 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:65:ba:cc:fd:e1:c7:88:e2:db:b7:5f:58:29:ce:ab:08:41:98:08]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:34:14.912  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:34:14.915 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:34:14.918 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-11 11:34:14.919 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:34:14.920  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-11 11:34:14.921  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:34:14.921  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:34:14.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:34:14.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:34:14.923 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:34:14.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:34:14.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:34:14.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:34:14.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:34:15.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:34:15.114  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:34:15.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:34:15.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:34:15.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:34:15.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:34:15.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:34:15.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:34:15.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:34:15.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:34:15.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:34:15.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:34:15.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:34:15.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:34:15.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:34:15.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:34:15.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:21:f2:82:ba:31:2d:9b:dc:e2:bd:32:5c:93:45:27:d6:8c:60:0c]
            modulus: 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
    public exponent: 10001

] 
2021-11-11 11:34:45.478  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-11 11:34:45.480 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-11 11:34:45.483 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-11 11:34:45.484 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-11 11:34:45.485  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-11 11:34:45.485  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-11 11:34:45.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-11 11:34:45.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-11 11:34:45.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-11 11:34:45.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-11 11:34:45.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-11 11:34:45.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:34:45.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-11 11:34:45.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:34:45.630  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-11 11:34:45.631  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-11 11:34:45.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-11 11:34:45.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-11 11:34:45.633  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-11 11:34:45.634  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-11 11:34:45.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:34:45.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:34:45.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:34:45.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:34:45.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:34:45.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:34:45.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-11 11:34:45.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-11 11:34:45.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-11 11:34:45.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-11 11:34:45.645 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 184632397336514387693994359648090288294675755320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 11 09:26:01 UTC 2021
           Final Date: Tue Nov 11 09:26:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad
                       a12373b44fa907f0f8e924519e0e1d9b083d2a91
                       5827a9e58d07bf3d49dd95f96f53cc96889c1c3f
                       fea47dd1662f132a6c70846d921d5e9230acba55
                       06a55a85ad27407f1cd25263926deba3c294d667
                       3ca0691dee43507d311255b7567aecf09f09fa50
                       cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e
                       74b643e4982a095b28b9738937a1a75d2a2720b2
                       3a4d48230af5e29e37c5375a19ca6d218d90c0c8
                       6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2
                       467f6554b02fe2ca51cdd6f9f3c862043bfd2485
                       bb2b5476feef9f8e7e3650a8a1bc0534dff7d865
                       377b3fc4e5715da62da96493861213ebcc7b0d71
                       5285a269b0377fb948dd40c29b3a2a2796d78bf4
                       569bfd4b4b418b96caf1417346bf4d5cf8cc66d9
                       6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8
                       0dd2a46ad0e4fc45063f7d645723d9469ec6bef9
                       e969800bdb8749a2a07b29a5e70e5c9c22648a84
                       4f4be38e54a97a741db6ee8ecf2b78f2f86416d4
                       892a1f66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:40:0d:f4:eb:07:02:2c:a2:8c:05:c7:9d:4c:5f:5b:79:19:98:37]
            modulus: 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
    public exponent: 10001

]