Results

By type

          2021-11-23 09:20:51,150 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-23 09:20:51,930 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-23 09:20:52.725  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-23 09:20:55.848 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-23 09:20:56.172  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-23 09:20:56.370  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-23 09:20:58.474  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.974 seconds (JVM running for 9.808)
2021-11-23 09:22:05.296  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 09:22:05.315 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 09:22:05.367 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-23 09:22:05.373 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 09:22:05.396  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-23 09:22:05.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 09:22:05.401  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 09:22:05.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 09:22:05.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 09:22:05.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 09:22:05.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 09:22:05.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 09:22:05.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 09:22:05.470 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 09:22:05.471 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 09:22:05.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 09:22:06.121  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 09:22:06.125  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 09:22:06.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 09:22:06.129 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 09:22:06.139  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 09:22:06.141  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 09:22:06.142 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 09:22:06.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 09:22:06.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 09:22:06.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 09:22:06.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 09:22:06.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 09:22:06.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 09:22:06.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 09:22:06.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 09:22:06.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 09:22:06.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: b8a47972ff4616f3080a36cdadcc9fc8622d6d66de8b8488ee3b6ba850d88ad444d7bb9d6ea94c284674f5318f8e910188c5603003aaae47742c41fa512188d2d938f467eb2e2fa89ce244d590a9957f16537c871fd9904516e8b0198f09283ae40a8a3c711bb87dfb9c55071ab12ba495cd44f12149c928db0f27dfc85e7c49b507711de2e479d8878573e9b7824e4fb88913490f1e3960c1a27995f08cbeed0fd4b7c61e4e185620b7ce4ec75250a4deca3e0ddaea234171c641e6c2d541143ce41cd3f931969d740dee0371ba3ad6707bbac6215a7825edcff35b1e34f6ad0bffb56234b22087e7feca39b46ef14f73a7a97d16792efd3b20d7b095444c331466295e33c815440a31be9fc0773e421d2a5453b2d39ee9f82912b39d52e78618372ab5ed6d5c3db627e9c4d32d134cdb10d160b21e6ee897fccf18f7096ba89473405ce948733ef0bc56cf70ba3c7d09abefbf9437b9848052027eec8e8ee8b04d690cc9687a2c6cae89392e17d6b4a5552023d34ff9f8d68a21483348e73b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:20:1f:39:d0:54:06:7c:01:70:eb:3e:24:ea:5b:03:10:76:0f:ab]
            modulus: b6bb81ff2eed10873bc4c74f2ee9738a5070e3d52010c013ff38d48ce2a6932ef32875c07f157eb2e0f50f1aa3634b102b782bcc22aeb2d01fd4ec5d53c96885e10a87c3de35a1d0d1943be8762569f0bcbeeb9ac42a937c7cb7d8be3476e1969effddcf91fbff188f96682f4b8e4913675d98965caf8c7d970669214b6a40f1ff1e9845463b6591adfa103c85a4c01b1c1e343a4024dedd2fe697ab3c87b5940383b494dbf0d3044045c5b0d2ef7f6855042b3cf6f9716072ec04eae5775e8744e4f8cff4a71b79dfb0c75a7a8d2c21150466c387398cee5ae608f54cfeb63a1ca1ca4cfd4ac1b8388b624cd8519454fd9f85c0a4e6c57245ab6d464544e3c5
    public exponent: 10001

] 
2021-11-23 11:19:33.984  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:19:33.987 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:19:33.991 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-23 11:19:33.992 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:19:33.993  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-23 11:19:33.994  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:19:33.995  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:19:33.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:19:33.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:19:33.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:19:34.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:19:34.006 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:19:34.006 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:19:34.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:19:34.235  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:19:34.236  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:19:34.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:19:34.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:19:34.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:19:34.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:19:34.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:19:34.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:19:34.243 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:19:34.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:19:34.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:19:34.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:19:34.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:19:34.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:19:34.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:19:34.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:19:34.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:ca:b0:3a:7b:54:79:ab:34:ce:d9:a2:db:4f:a0:02:24:43:a6:8d]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:23:48.512  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:23:48.516 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:23:48.518 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-23 11:23:48.519 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:23:48.524  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-23 11:23:48.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:23:48.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:23:48.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:23:48.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:23:48.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:23:48.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:23:48.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:23:48.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:23:48.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:23:48.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:23:48.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:23:48.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:23:48.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:23:48.700  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:23:48.701  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:23:48.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:23:48.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:23:48.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:23:48.704 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:23:48.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:23:48.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:23:48.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:23:48.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:23:48.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:23:48.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:23:48.715 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: b8a47972ff4616f3080a36cdadcc9fc8622d6d66de8b8488ee3b6ba850d88ad444d7bb9d6ea94c284674f5318f8e910188c5603003aaae47742c41fa512188d2d938f467eb2e2fa89ce244d590a9957f16537c871fd9904516e8b0198f09283ae40a8a3c711bb87dfb9c55071ab12ba495cd44f12149c928db0f27dfc85e7c49b507711de2e479d8878573e9b7824e4fb88913490f1e3960c1a27995f08cbeed0fd4b7c61e4e185620b7ce4ec75250a4deca3e0ddaea234171c641e6c2d541143ce41cd3f931969d740dee0371ba3ad6707bbac6215a7825edcff35b1e34f6ad0bffb56234b22087e7feca39b46ef14f73a7a97d16792efd3b20d7b095444c331466295e33c815440a31be9fc0773e421d2a5453b2d39ee9f82912b39d52e78618372ab5ed6d5c3db627e9c4d32d134cdb10d160b21e6ee897fccf18f7096ba89473405ce948733ef0bc56cf70ba3c7d09abefbf9437b9848052027eec8e8ee8b04d690cc9687a2c6cae89392e17d6b4a5552023d34ff9f8d68a21483348e73b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:d2:ee:00:39:dc:92:15:66:44:31:d9:dd:e9:00:4e:33:8c:07:18]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:24:20.268  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:24:20.271 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:24:20.273 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-23 11:24:20.274 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:24:20.275  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-23 11:24:20.276  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:24:20.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:24:20.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:24:20.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:24:20.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:24:20.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:24:20.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:24:20.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:24:20.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:24:20.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:24:20.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:24:20.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:24:20.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:24:20.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:24:20.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:24:20.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:20.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:20.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:20.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:20.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:20.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:20.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:20.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:20.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:20.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:24:20.447 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: b8a47972ff4616f3080a36cdadcc9fc8622d6d66de8b8488ee3b6ba850d88ad444d7bb9d6ea94c284674f5318f8e910188c5603003aaae47742c41fa512188d2d938f467eb2e2fa89ce244d590a9957f16537c871fd9904516e8b0198f09283ae40a8a3c711bb87dfb9c55071ab12ba495cd44f12149c928db0f27dfc85e7c49b507711de2e479d8878573e9b7824e4fb88913490f1e3960c1a27995f08cbeed0fd4b7c61e4e185620b7ce4ec75250a4deca3e0ddaea234171c641e6c2d541143ce41cd3f931969d740dee0371ba3ad6707bbac6215a7825edcff35b1e34f6ad0bffb56234b22087e7feca39b46ef14f73a7a97d16792efd3b20d7b095444c331466295e33c815440a31be9fc0773e421d2a5453b2d39ee9f82912b39d52e78618372ab5ed6d5c3db627e9c4d32d134cdb10d160b21e6ee897fccf18f7096ba89473405ce948733ef0bc56cf70ba3c7d09abefbf9437b9848052027eec8e8ee8b04d690cc9687a2c6cae89392e17d6b4a5552023d34ff9f8d68a21483348e73b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:c6:47:fe:50:f8:3a:d1:e8:3d:6f:02:20:5a:38:9b:d1:61:59:f5]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:24:23.299  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:24:23.300 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:24:23.303 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-23 11:24:23.304 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:24:23.305  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-23 11:24:23.310  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:24:23.310  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:24:23.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:24:23.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:24:23.312 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:24:23.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:24:23.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:24:23.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:24:23.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:24:23.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:24:23.429  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:24:23.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:24:23.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:24:23.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:24:23.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:24:23.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:23.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:23.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:23.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:23.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:23.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:23.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:23.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:23.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:23.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:24:23.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:c4:68:51:3c:cd:0e:cf:26:ae:84:3d:2e:cb:86:ee:ab:ab:70:26]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:24:55.994  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:24:55.996 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:24:55.997 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-23 11:24:55.999 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:24:56.002  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-23 11:24:56.004  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:24:56.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:24:56.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:24:56.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:24:56.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:24:56.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:24:56.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:24:56.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:24:56.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:24:56.232  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:24:56.233  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:24:56.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:24:56.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:24:56.237  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:24:56.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:24:56.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:56.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:56.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:56.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:56.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:56.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:56.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:24:56.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:24:56.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:24:56.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:24:56.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: b8a47972ff4616f3080a36cdadcc9fc8622d6d66de8b8488ee3b6ba850d88ad444d7bb9d6ea94c284674f5318f8e910188c5603003aaae47742c41fa512188d2d938f467eb2e2fa89ce244d590a9957f16537c871fd9904516e8b0198f09283ae40a8a3c711bb87dfb9c55071ab12ba495cd44f12149c928db0f27dfc85e7c49b507711de2e479d8878573e9b7824e4fb88913490f1e3960c1a27995f08cbeed0fd4b7c61e4e185620b7ce4ec75250a4deca3e0ddaea234171c641e6c2d541143ce41cd3f931969d740dee0371ba3ad6707bbac6215a7825edcff35b1e34f6ad0bffb56234b22087e7feca39b46ef14f73a7a97d16792efd3b20d7b095444c331466295e33c815440a31be9fc0773e421d2a5453b2d39ee9f82912b39d52e78618372ab5ed6d5c3db627e9c4d32d134cdb10d160b21e6ee897fccf18f7096ba89473405ce948733ef0bc56cf70ba3c7d09abefbf9437b9848052027eec8e8ee8b04d690cc9687a2c6cae89392e17d6b4a5552023d34ff9f8d68a21483348e73b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:9f:96:15:b3:b2:7e:56:3c:eb:5d:2b:ce:e1:b4:19:4b:17:6f:a7]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:25:56.398  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:25:56.400 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:25:56.409 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-23 11:25:56.413 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:25:56.416  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-23 11:25:56.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:25:56.418  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:25:56.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:25:56.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:25:56.426 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:25:56.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:25:56.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:25:56.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:25:56.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:25:56.603  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:25:56.605  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:25:56.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:25:56.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:25:56.607  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:25:56.608  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:25:56.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:25:56.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:25:56.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:25:56.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:25:56.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:25:56.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:25:56.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:25:56.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:25:56.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:25:56.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:25:56.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:25:00:d6:9d:6d:82:fe:a2:dc:16:ee:99:d5:23:a9:64:03:bf:d5]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:26:40.572  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:26:40.574 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:26:40.577 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-23 11:26:40.578 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:26:40.579  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-23 11:26:40.580  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:26:40.580  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:26:40.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:26:40.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:26:40.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:26:40.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:26:40.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:26:40.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:26:40.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:26:40.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:26:40.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:26:40.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:26:40.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:26:40.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:26:40.742  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:26:40.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:26:40.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:26:40.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:26:40.744 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:26:40.744 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:26:40.744 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:26:40.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:26:40.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:26:40.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:26:40.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:26:40.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:10:62:d7:d5:05:d5:bc:98:ae:9b:cf:96:e3:dd:45:52:ba:20:fd]
            modulus: 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
    public exponent: 10001

] 
2021-11-23 11:27:48.600  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-23 11:27:48.605 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-23 11:27:48.608 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-23 11:27:48.613 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-23 11:27:48.614  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-23 11:27:48.615  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-23 11:27:48.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-23 11:27:48.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-23 11:27:48.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-23 11:27:48.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-23 11:27:48.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-23 11:27:48.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:27:48.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-23 11:27:48.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:27:48.794  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-23 11:27:48.795  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-23 11:27:48.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-23 11:27:48.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-23 11:27:48.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-23 11:27:48.798  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-23 11:27:48.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:27:48.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:27:48.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:27:48.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:27:48.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:27:48.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:27:48.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-23 11:27:48.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-23 11:27:48.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-23 11:27:48.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-23 11:27:48.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 333527859964424676108245444180080164363990839879
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 23 09:15:27 UTC 2021
           Final Date: Sun Nov 23 09:15:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:17:a5:ae:bc:5f:cb:84:55:eb:a1:44:da:f5:97:c1:90:92:49:e2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a585910468789fbdaae9e4768d23f6eaa52fcddd
                       23f8caeee088da610c047b134995eb43665b9aac
                       14020a29a6e183a88d8abf5a46dada4372be8d5f
                       2a0e0f5d1ce887eeea62f4a49c62b0f012d833cc
                       4cc5e8224bb3b48971a7c5b7366c929d72c3c2f6
                       40bc09ef53b6b2b0c5fc4968331dc7a20ee15ca6
                       7d56cd02f6bb8fb7652c14d1d535c267f21fab76
                       250dff6fcfd66df886caab49f56f2a44bf949c87
                       360183620321e6bedc18070965c31ce4f4999b88
                       68d7c63fceb7b63613f16369f95823c32d226b65
                       f6064caf9d3a8211cfc1321638c77a0d68b21962
                       58232e92de561c1a54d607f7f4f35f1308feb68c
                       681415415831de3703814a745fab4caa645676e2
                       fb34f10cfd184626e0d0d096f73ff1bd6ff81dd1
                       ee1092606043e9f8ee3609a0883c5150b2baf66d
                       69c779b8d8d4c6f3b66b5df8c44dde910852966e
                       20d0bf46be9fb23b0819ffa1aec8a52767cd1f51
                       5920e10cda068d0353b4cf871a50cfa00f23bded
                       fc2726ee405a75d58b2e2a6259b3a73d69c813eb
                       cdf8926d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:63:d1:77:f8:b7:08:9f:a3:36:fa:3f:94:dc:37:f9:a5:ad:58:9e]
            modulus: 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
    public exponent: 10001

]