Results

By type

          2021-11-15 09:14:36,194 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-15 09:14:37,065 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-15 09:14:37.788  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-15 09:14:40.857 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-15 09:14:41.146  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-15 09:14:41.315  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-15 09:14:43.550  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.989 seconds (JVM running for 9.738)
2021-11-15 09:15:27.837  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 09:15:27.848 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 09:15:27.898 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-15 09:15:27.903 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 09:15:27.929  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-15 09:15:27.933  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 09:15:27.934  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 09:15:27.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 09:15:27.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 09:15:27.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 09:15:27.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 09:15:27.953 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 09:15:28.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 09:15:28.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 09:15:28.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 09:15:28.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 09:15:28.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 09:15:28.639  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 09:15:28.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 09:15:28.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 09:15:28.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 09:15:28.653  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 09:15:28.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 09:15:28.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 09:15:28.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 09:15:28.667 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 09:15:28.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 09:15:28.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 09:15:28.674 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 09:15:28.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 09:15:28.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 09:15:28.677 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 09:15:28.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:d3:b6:7f:07:c0:9c:44:b1:24:11:a3:0f:89:c7:83:c9:e1:86:65]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 11:07:25.326  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:07:25.331 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:07:25.336 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-15 11:07:25.337 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:07:25.339  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-15 11:07:25.340  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:07:25.340  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:07:25.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:07:25.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:07:25.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:07:25.351 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:07:25.352 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:07:25.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:07:25.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:07:25.538  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:07:25.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:07:25.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:07:25.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:07:25.547  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:07:25.548  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:07:25.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:07:25.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:07:25.551 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:07:25.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:07:25.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:07:25.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:07:25.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:07:25.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:07:25.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:07:25.557 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:07:25.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:99:d5:e5:f3:92:40:f4:85:c7:c4:21:47:59:34:76:48:b2:25:c2]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 11:12:00.012  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:12:00.017 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:12:00.020 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 11:12:00.025 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:12:00.026  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 11:12:00.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:12:00.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:12:00.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:12:00.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:12:00.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:12:00.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:12:00.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:12:00.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:12:00.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:12:00.221  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:12:00.222  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:12:00.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:12:00.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:12:00.228  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:12:00.229  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:12:00.229 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:12:00.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:12:00.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:12:00.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:12:00.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:12:00.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:12:00.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:12:00.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:12:00.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:12:00.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:12:00.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: c037face4fd9b75792d2a95545af530e62d7ff0023fcef7c841594db50c479cf4616207a73e38e1b0a94619bb2091eaa590a8c1d9c461dbc462720c8b4db319424f3c64844006fb5ee143ed257a1013aa61193de50d58c402c30f795593f0fa722c57c3a7a56f2f4410b5cf46b4f18c0426cf2d1d18b2a9240b59a2a4079afbaee2a325847045bfa48aba341ee1ce41fe118fe5e02a5e602e92ab1ff015328623760d0482e3353bab426a4997e446962db0cf7a9bb026738243b5c042fb804463b4641a460120d3a3d4c1e874ea8e123393da3e2d6e41dd6345798627a0fa82571147e67913dd8bb55d46e6bb6d2083ef2a953c91f8ebdc6bac446f6eaa4641ec0cf9440296d2d5ec72e5c45c7b58b7fb43e27b7b36e20c502be443db7eb0a542dbadf565532c00e1a3c7013be2dbabb68f480896cceb14576a605ee978aab45f49c9dd7689272274bef5a801baf144512e17ddd61a0816b89becb7a69499584b672d3cd194bd256aa845675ba752e80db225d97853f94b1528d915706c411b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:92:f6:8e:49:8e:61:b9:c2:8b:a1:d7:6a:44:29:c8:c5:0b:74:58]
            modulus: dbb86c862778d51bf7eb931a378c9b5e2c7d6c42e7bc2dc181110db52d00bf4bfaaafc394dd49caeb585e4038e1775ffe44f39dc75cfb5e035773c34b734709fd44ee32518bc979a424774c2c9138f41077c6aed278db44af13a74d67bfd885854e1a346cd253d233d4c34c352509449527118de98615b935f683329106ea36ef0b9960a2c9a009c8faffbf7d2bff0a18722c41c2a16ed8d87a6f5e6ce7da0014456b4c6c52697fd2a97a47e63ec3ff8bf26d7d75f4d8fad83ca412cb75307f3fc209054b3680763bb2c2390ecd431125eb0a3228907d21715ffcbc3d2c48f081854e1338b4f6d0b7af698b4f48895c5355941aa316b966f61e9911de3b25351
    public exponent: 10001

] 
2021-11-15 11:12:31.689  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:12:31.694 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:12:31.699 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-15 11:12:31.702 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:12:31.702  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-15 11:12:31.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:12:31.704  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:12:31.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:12:31.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:12:31.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:12:31.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:12:31.713 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:12:31.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:12:31.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:12:31.836  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:12:31.837  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:12:31.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:12:31.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:12:31.846  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:12:31.847  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:12:31.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:12:31.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:12:31.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:12:31.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:12:31.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:12:31.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:12:31.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:12:31.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:12:31.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:12:31.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:12:31.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: c037face4fd9b75792d2a95545af530e62d7ff0023fcef7c841594db50c479cf4616207a73e38e1b0a94619bb2091eaa590a8c1d9c461dbc462720c8b4db319424f3c64844006fb5ee143ed257a1013aa61193de50d58c402c30f795593f0fa722c57c3a7a56f2f4410b5cf46b4f18c0426cf2d1d18b2a9240b59a2a4079afbaee2a325847045bfa48aba341ee1ce41fe118fe5e02a5e602e92ab1ff015328623760d0482e3353bab426a4997e446962db0cf7a9bb026738243b5c042fb804463b4641a460120d3a3d4c1e874ea8e123393da3e2d6e41dd6345798627a0fa82571147e67913dd8bb55d46e6bb6d2083ef2a953c91f8ebdc6bac446f6eaa4641ec0cf9440296d2d5ec72e5c45c7b58b7fb43e27b7b36e20c502be443db7eb0a542dbadf565532c00e1a3c7013be2dbabb68f480896cceb14576a605ee978aab45f49c9dd7689272274bef5a801baf144512e17ddd61a0816b89becb7a69499584b672d3cd194bd256aa845675ba752e80db225d97853f94b1528d915706c411b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:d3:d3:b0:42:9e:4f:71:7e:9f:b7:03:96:7c:44:b9:be:b9:7b:62]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 11:13:05.700  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:13:05.701 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:13:05.703 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-15 11:13:05.704 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:13:05.704  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-15 11:13:05.705  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:13:05.706  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:13:05.706 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:13:05.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:13:05.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:13:05.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:13:05.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:13:05.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:13:05.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:13:05.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:13:05.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:13:05.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:13:05.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:13:05.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:13:05.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:13:05.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:13:05.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:13:05.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:13:05.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:13:05.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:13:05.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:13:05.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:13:05.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:13:05.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:13:05.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:13:05.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:18:57:ca:82:79:67:d6:2d:2d:f0:4b:2c:d4:6c:2c:93:74:2f:5d]
            modulus: cf15d247da6cea3166864278edc66d742836c1be451d2028cdadf47966a8516a6d0de0f4493ddd312abc454dabaa9e902e59ef38fb791df41111f7d21c4a8929388045c5fc8f467fefcdf01d3ca4e1b7a4075f58d8bbcf729fdde98191a77f063066cd8d73d6de29f5a3367fb38d075fb4a96432dc4505e92c61c7ca42165428f5737bf554262414c9dfaa02d18c0d646d9ec341b3ba8cc11202ac6175bc75a8b766522dedeb7036024e86b4d2535463780214e245791fc75ad94f89d74cc153e76c02a24d2581a28be98097c7e5efd0d6261627cd5625ed100ad4800474781522b73f611820b6a4865eea7445083398cda32b3c15b0f223f06ebbe1a3d85917
    public exponent: 10001

] 
2021-11-15 11:13:20.257  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:13:20.259 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:13:20.260 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 11:13:20.261 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:13:20.262  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 11:13:20.262  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:13:20.263  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:13:20.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:13:20.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:13:20.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:13:20.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:13:20.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:13:20.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:13:20.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:13:20.400  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:13:20.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:13:20.401 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:13:20.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:13:20.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:13:20.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:13:20.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:13:20.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:13:20.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:13:20.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:13:20.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:13:20.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:13:20.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:13:20.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:13:20.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:13:20.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:13:20.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:93:56:33:89:27:ce:0b:f9:dd:aa:40:01:ed:73:0a:88:08:d6:89]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 11:14:53.794  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:14:53.801 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:14:53.803 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 11:14:53.804 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:14:53.805  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 11:14:53.806  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:14:53.806  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:14:53.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:14:53.807 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:14:53.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:14:53.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:14:53.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:14:53.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:14:53.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:14:53.973  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:14:53.973  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:14:53.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:14:53.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:14:53.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:14:53.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:14:53.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:14:53.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:14:53.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:14:53.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:14:53.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:14:53.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:14:53.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:14:53.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:14:53.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:14:53.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:14:53.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:61:e6:57:1d:42:b3:61:61:3d:a7:eb:08:74:c5:67:a2:63:a0:c4]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 11:14:56.831  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:14:56.834 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:14:56.837 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 11:14:56.837 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:14:56.838  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 11:14:56.839  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:14:56.839  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:14:56.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:14:56.840 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:14:56.840 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:14:56.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:14:56.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:14:56.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:14:56.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:14:56.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:14:56.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:14:56.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:14:56.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:14:56.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:14:56.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:14:56.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:14:56.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:14:56.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:14:56.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:14:56.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:14:56.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:14:56.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:14:56.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:14:56.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:14:56.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:14:56.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:ae:bc:48:bd:cd:32:05:a5:31:60:51:08:10:cc:63:fb:67:db:79]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 11:17:05.709  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 11:17:05.713 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 11:17:05.725 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-15 11:17:05.726 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 11:17:05.727  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-15 11:17:05.727  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 11:17:05.728  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 11:17:05.728 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 11:17:05.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 11:17:05.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 11:17:05.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 11:17:05.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:17:05.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 11:17:05.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:17:05.921  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 11:17:05.922  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 11:17:05.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 11:17:05.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 11:17:05.924  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 11:17:05.925  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 11:17:05.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:17:05.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:17:05.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:17:05.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:17:05.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:17:05.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:17:05.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 11:17:05.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 11:17:05.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 11:17:05.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 11:17:05.934 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 253318904439572524697006117984221357586435897668
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 09:11:41 UTC 2021
           Final Date: Sat Nov 15 09:11:40 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:29:f6:ce:09:20:8f:7f:61:97:b6:29:8f:ef:7c:80:28:4a:ad:79]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0df8c40bd3dce77e34cdbaf0b8f54fc395b5dc7b
                       e1c39c5c208173054e0e008112dff76060564977
                       3aa4dc90e6f31e03e4b4a739ddcaa4d7006d6c7e
                       f0ead2e0b073a620edf650c10a53b01ffb6e3a00
                       8a383fe99c0d321a4fbcedd17a9f2c6640d68872
                       5471730bebf1cda5eab8cf2234cc3e00c9ca119a
                       27dafe517a39a33908d3353a9a633daa19ec18cd
                       4e9589329277e5da37e50be3479e00a47324a1cb
                       49710356973ba065d7f75e0b3612e9daa0e23741
                       846a8382de4967d60db70b7ad46a5036296e9ae1
                       78ff8b206b55fb08ea61dad1b295fc382fdee5f1
                       2ce1144818e03b837a85bcea182583e10cc079b4
                       39eb291f72526a6fbba85bd00016ed0fe3a747ae
                       91df8f0b1292adab5ed06cc903776ca9ba0f5dd5
                       7f7c01e89fc317bbecfcd23d4dbfc4b498d53803
                       f59a28460dde54fb7fd9241f9dd12e3706a15d31
                       d03efd5b8c4ec35104b84396222683154cf2475b
                       94c7d78c0dbd7a9b2a00d5a510484d3626fce205
                       6ec39d15d756a9b74d10502a5290e030d668f6f7
                       f8de50bc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:38:14:41:1b:ad:a2:c5:77:a1:af:60:df:6e:b1:de:3f:52:06:09]
            modulus: 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
    public exponent: 10001

]