Results

By type

          2021-11-20 09:30:28,929 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-20 09:30:29,893 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-20 09:30:30.706  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-20 09:30:33.452 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-20 09:30:33.758  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-20 09:30:33.937  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-20 09:30:36.073  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.786 seconds (JVM running for 9.494)
2021-11-20 09:33:02.584  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 09:33:02.606 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 09:33:02.661 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-20 09:33:02.671 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 09:33:02.693  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-20 09:33:02.697  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 09:33:02.698  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 09:33:02.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 09:33:02.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 09:33:02.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 09:33:02.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 09:33:02.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 09:33:02.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 09:33:02.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 09:33:02.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 09:33:02.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 09:33:03.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 09:33:03.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 09:33:03.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 09:33:03.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 09:33:03.508  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 09:33:03.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 09:33:03.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 09:33:03.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 09:33:03.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 09:33:03.525 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 09:33:03.525 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 09:33:03.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 09:33:03.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 09:33:03.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 09:33:03.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 09:33:03.539 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 09:33:03.592 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:ac:28:e2:e7:fe:bd:69:33:74:b0:70:9b:97:1b:08:1a:58:29:c4]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:30:05.564  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:30:05.567 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:30:05.572 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-20 11:30:05.574 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:30:05.575  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-20 11:30:05.576  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:30:05.577  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:30:05.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:30:05.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:30:05.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:30:05.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:30:05.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:30:05.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:30:05.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:30:05.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:30:05.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:30:05.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:30:05.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:30:05.838  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:30:05.839  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:30:05.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:30:05.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:30:05.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:30:05.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:30:05.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:30:05.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:30:05.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:30:05.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:30:05.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:30:05.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:30:05.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:93:fa:b5:7b:64:7b:3b:b9:80:95:10:7b:c8:03:b7:2e:e8:40:39]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:35:17.293  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:35:17.296 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:35:17.299 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-20 11:35:17.300 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:35:17.301  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-20 11:35:17.302  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:35:17.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:35:17.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:35:17.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:35:17.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:35:17.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:35:17.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:35:17.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:35:17.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:35:17.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:35:17.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:35:17.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:35:17.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:35:17.494  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:35:17.494  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:35:17.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:35:17.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:35:17.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:35:17.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:35:17.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:35:17.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:35:17.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:35:17.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:35:17.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:35:17.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:35:17.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:fc:54:0c:29:79:d4:8e:20:aa:50:f4:15:6b:db:89:d4:c9:03:5c]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:35:50.305  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:35:50.306 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:35:50.308 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-20 11:35:50.309 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:35:50.309  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-20 11:35:50.311  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:35:50.312  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:35:50.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:35:50.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:35:50.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:35:50.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:35:50.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:35:50.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:35:50.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:35:50.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:35:50.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:35:50.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:35:50.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:35:50.473  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:35:50.474  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:35:50.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:35:50.475 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:35:50.475 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:35:50.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:35:50.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:35:50.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:35:50.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:35:50.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:35:50.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:35:50.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:35:50.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:46:06:32:e0:cf:71:fb:b1:6f:24:11:19:27:51:17:ab:18:6c:6e]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:36:11.749  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:36:11.756 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:36:11.759 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-20 11:36:11.760 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:36:11.761  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-20 11:36:11.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:36:11.764  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:36:11.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:36:11.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:36:11.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:36:11.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:36:11.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:36:11.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:36:11.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:36:11.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:36:11.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:36:11.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:36:11.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:36:11.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:36:11.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:36:11.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:36:11.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:36:11.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:36:11.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:36:11.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:36:11.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:36:11.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:36:11.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:36:11.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:36:11.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:36:11.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:56:79:30:82:38:aa:4c:96:d8:d4:0c:cd:72:b3:04:77:37:ca:c6]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:36:23.571  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:36:23.573 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:36:23.578 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-20 11:36:23.580 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:36:23.586  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-20 11:36:23.588  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:36:23.588  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:36:23.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:36:23.602 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:36:23.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:36:23.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:36:23.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:36:23.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:36:23.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:36:23.815  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:36:23.816  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:36:23.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:36:23.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:36:23.818  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:36:23.819  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:36:23.819 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:36:23.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:36:23.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:36:23.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:36:23.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:36:23.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:36:23.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:36:23.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:36:23.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:36:23.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:36:23.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:ef:d9:e9:2f:f6:2f:23:79:fc:2b:5c:5f:83:2a:ab:b0:52:ad:4e]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:37:43.725  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:37:43.733 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:37:43.735 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-20 11:37:43.740 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:37:43.740  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-20 11:37:43.741  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:37:43.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:37:43.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:37:43.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:37:43.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:37:43.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:37:43.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:37:43.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:37:43.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:37:43.937  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:37:43.938  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:37:43.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:37:43.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:37:43.941  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:37:43.941  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:37:43.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:37:43.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:37:43.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:37:43.943 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:37:43.943 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:37:43.944 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:37:43.944 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:37:43.945 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:37:43.945 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:37:43.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:37:43.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: ac3e382b8d37ca27a5bcf0e5a47b9154a38d8fd1bde3e9cba8408462493f664be6618de1b45f8d997e1c582559563c4790f23dee49dc778951825a0f5f314a0fdcf5b16606d873bff398522d32aaaa8bbd68abcb7c10adf679e6565341beecca14a590330aaa009353bc839319feb39d973b6a472c2428664281d2f00df5e129a3fdba0fdf2ad2e65ab0dc9f3a427cf637d4b4865ec9929a2eb1ca6d462a88edb04db7c64aeb21933a57de8852dea9c7f4bd898a2ea201fbef6b7a7e99865d1951b5f855400872e1f989401a09a92d7721512c28e582c3493dd19b1c359a22048ade1baef5269523aea219895887470ee44c1f05b719498e7ffcf2e32410d13966a1dd91d01cc93ea404a2bb37730d4b1615bb14f60ec48fd296b84457ca29e7d965ac3a51f314624dcaa559d23eebbda5085a6f11e0785c935bc057dcfb2d33d1b053a3806d7dd9dd1eeed78435f6a9d6a8709a5104c0d83fe8d1988ce7bb54dcce97b309f17f16b6a30de29a3485b1b6583340a3e0b902bded7d0a2dd8654b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:ed:b1:f2:d9:cd:33:b1:8c:a7:ec:26:05:67:b8:75:3c:a1:e1:d6]
            modulus: b6603ef5e14c2e0ff5ea47ae4576c884216c704b46410205b4137c1a49fd38a146bd5dd19129e3c9d06d18d720742cce27e021ac060c12426951f357e495fffe0eab904594207abb1e5792bff791c65f2042c4ebf62f07cb4917dbac518ea112a53772f9b2663330aa46161356b312c3d5cf2e624fd1d491d9267a2a9b8859afa3f6dddbe2116e12bd88e53b853c982afaee0536e7d1412272039ae81d9877443936730590ed1346ca21685b7d4c96aafb6fca92149e7c8ac833f3b343af14972a9883d9ad70dc874cdc60488bfbf4ac8dd384df91161eb23b05564d60571aa6487034f4c3c1c353b121c3c5012f051aad7076551a456ae57595fc39bae890e5
    public exponent: 10001

] 
2021-11-20 11:38:10.713  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:38:10.716 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:38:10.718 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-20 11:38:10.719 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:38:10.720  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-20 11:38:10.720  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:38:10.721  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:38:10.722 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:38:10.723 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:38:10.723 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:38:10.728 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:38:10.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:38:10.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:38:10.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:38:10.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:38:10.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:38:10.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:38:10.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:38:10.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:38:10.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:38:10.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:38:10.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:38:10.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:38:10.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:38:10.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:38:10.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:38:10.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:38:10.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:38:10.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:38:10.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:38:10.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:20:a6:c0:6a:f6:76:98:5f:ff:06:66:f5:59:e3:31:ef:97:91:ee]
            modulus: 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
    public exponent: 10001

] 
2021-11-20 11:39:40.766  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-20 11:39:40.770 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-20 11:39:40.773 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-20 11:39:40.774 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-20 11:39:40.775  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-20 11:39:40.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-20 11:39:40.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-20 11:39:40.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-20 11:39:40.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-20 11:39:40.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-20 11:39:40.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-20 11:39:40.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:39:40.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-20 11:39:40.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:39:40.938  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-20 11:39:40.939  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-20 11:39:40.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-20 11:39:40.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-20 11:39:40.942  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-20 11:39:40.943  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-20 11:39:40.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:39:40.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:39:40.945 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:39:40.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:39:40.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:39:40.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:39:40.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-20 11:39:40.949 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-20 11:39:40.949 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-20 11:39:40.951 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-20 11:39:40.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 564623195542020120435208874614241078130747841037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 20 09:25:31 UTC 2021
           Final Date: Thu Nov 20 09:25:30 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9e:74:17:1c:3b:5b:9e:19:af:87:d4:f5:7a:8b:9e:b4:e0:da:a7:88]
            modulus: ac3e382b8d37ca27a5bcf0e5a47b9154a38d8fd1bde3e9cba8408462493f664be6618de1b45f8d997e1c582559563c4790f23dee49dc778951825a0f5f314a0fdcf5b16606d873bff398522d32aaaa8bbd68abcb7c10adf679e6565341beecca14a590330aaa009353bc839319feb39d973b6a472c2428664281d2f00df5e129a3fdba0fdf2ad2e65ab0dc9f3a427cf637d4b4865ec9929a2eb1ca6d462a88edb04db7c64aeb21933a57de8852dea9c7f4bd898a2ea201fbef6b7a7e99865d1951b5f855400872e1f989401a09a92d7721512c28e582c3493dd19b1c359a22048ade1baef5269523aea219895887470ee44c1f05b719498e7ffcf2e32410d13966a1dd91d01cc93ea404a2bb37730d4b1615bb14f60ec48fd296b84457ca29e7d965ac3a51f314624dcaa559d23eebbda5085a6f11e0785c935bc057dcfb2d33d1b053a3806d7dd9dd1eeed78435f6a9d6a8709a5104c0d83fe8d1988ce7bb54dcce97b309f17f16b6a30de29a3485b1b6583340a3e0b902bded7d0a2dd8654b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7071d4c6a40e61d9197a3e0f362de49db7baf10a
                       59bf2b0cdd46be5ccded960b70a06c1832304e94
                       e796d592fe645f6e63966b994818b7547dc6decf
                       3739433444e20293d6d3fef5a5d7f256ce065d4e
                       4f56c1e2b4c3b818bc35f4f5438e293ed67e8c56
                       3bfc10f437c060ca896555c8c31eb3e80da9199a
                       3be3d07c4e7b2af0140625f94b982ea0e901e62e
                       ec2f3069a30f3edeb5cff328612b4cc25b1df01a
                       2cb327a55b10af886aaa563934c4e7c33bdb9786
                       90fcaa576fb68b38f59517033014b360b4f6206e
                       e792219def840de81cab4dfeb5fa3c0657cc3f9f
                       f3fc686f01abdde564c452c71e866b432c9b853c
                       beef708b8a470b73eb73fa194a2f0380d4456b5c
                       349c1bb35dc193853772c055a9640cf37d9e5836
                       a1c26d7f4dcdf370e287314e4da5f9bb63de8ac7
                       0853bb4e3ced5d9e72368f766bbfa2d950e01ade
                       4dac952d89d18aba1cd2824100581fed2aa276df
                       1264cc8a9d57f587cc8884c8136ca98624691cf9
                       c2da3cbc4815c5b3680d5b21f93e8e41a6fc5f7c
                       15c7fadd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:e8:38:30:f1:5e:c1:3e:5a:ef:de:49:38:45:1b:e3:ee:ac:ef:b9]
            modulus: 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
    public exponent: 10001

]