Results

By type

          2021-11-25 09:21:22,304 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-25 09:21:23,223 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-25 09:21:24.073  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-25 09:21:27.326 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-25 09:21:27.599  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-25 09:21:27.749  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-25 09:21:29.980  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.258 seconds (JVM running for 10.288)
2021-11-25 09:22:14.535  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 09:22:14.547 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 09:22:14.607 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-25 09:22:14.612 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 09:22:14.637  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-25 09:22:14.641  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 09:22:14.642  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 09:22:14.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 09:22:14.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 09:22:14.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 09:22:14.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 09:22:14.662 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 09:22:14.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 09:22:14.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 09:22:14.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 09:22:14.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 09:22:15.538  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 09:22:15.543  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 09:22:15.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 09:22:15.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 09:22:15.562  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 09:22:15.564  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 09:22:15.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 09:22:15.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 09:22:15.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 09:22:15.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 09:22:15.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 09:22:15.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 09:22:15.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 09:22:15.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 09:22:15.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 09:22:15.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 09:22:15.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:da:47:47:b5:ee:7a:b6:a8:4e:8a:4b:94:ec:62:c0:03:3c:5f:66]
            modulus: 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
    public exponent: 10001

] 
2021-11-25 11:20:11.489  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:20:11.493 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:20:11.497 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-25 11:20:11.499 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:20:11.500  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-25 11:20:11.502  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:20:11.503  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:20:11.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:20:11.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:20:11.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:20:11.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:20:11.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:20:11.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:20:11.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:20:11.721  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:20:11.722  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:20:11.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:20:11.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:20:11.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:20:11.728  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:20:11.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:20:11.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:20:11.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:20:11.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:20:11.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:20:11.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:20:11.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:20:11.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:20:11.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:20:11.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:20:11.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:85:a8:db:3f:3b:9f:6c:b1:90:c0:48:2a:bf:2a:cb:bf:fb:4a:00]
            modulus: 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
    public exponent: 10001

] 
2021-11-25 11:24:45.037  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:24:45.040 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:24:45.045 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-25 11:24:45.048 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:24:45.050  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-25 11:24:45.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:24:45.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:24:45.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:24:45.054 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:24:45.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:24:45.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:24:45.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:24:45.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:24:45.067 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:24:45.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:24:45.241  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:24:45.242 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:24:45.243 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:24:45.246  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:24:45.246  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:24:45.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:24:45.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:24:45.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:24:45.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:24:45.251 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:24:45.251 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:24:45.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:24:45.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:24:45.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:24:45.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:24:45.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: dc4794fae67925c49cb39416f3bb3c7288d565ff777507f390c67bc5fc80bfbad61a178ab77cc0b8eea366d05a0770ba5d83d9be92a1291a7aabbf54b448223ee6090ea19b215983db4b2fe7d9dff5db03d7a50c33932bbef63e69fbe8c53151e537c84a4e50cb98e9516adc263e167d66ddddcc79b305bb5c2cac2dd6eda0c18db85519001021b00467bce80b4ba62bad95b783794b2e520fc0047c1509aa1187317bbde2edf0b7256706064214f02b950a60cf9e7c1ccd2e365ae1173df58b269cd5bccbce58860eb87dfaf6d27ceeedd1b6d2c511d820e4f66d27c03fd1477cbcab49f9e4674f8ccb828509c00787ce4615a46145993470ed2e13633ff8d3da784050889ec3177cef3b1d491b2d5ef3a6ee68bdb46c98fd6b883976701b93a35cb8ee5baad470efa7270a1f2113c3184c3e043a59fa43c3bcf5b0aafe9a49f6040752403b84ac0a9fcbb9df8430b340b1d1145e5fb196d1b71adcc18ebfcd6517161b78d5d05328a0ff8bbc5f8997142e0daaf2dad968435c4c06cf35d04f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:68:d4:f0:a2:e3:24:9c:f2:3a:28:c1:8d:e9:f7:ef:c1:71:2f:50]
            modulus: c9feb767b5b656f68d08cfaca8514cbd8a92c77db92a81ed99bb324561431cb37d1a6077eb7bd0dfefe276e7174709aceb0a44ef2f9b821ecdd0b02254b0dcb2d702098be1c315bc0769868028b7a828b80cc7b546ed29c9de78fd8d4cf32e87de8389b5fa5995d15e6662aefa885da7f463b55763be9d2f7a1f07b1a3c3531ec6e50a8e6084c8feae0be6bd204edd230e674580d94adf722ec8d377df9faad442c692340aeb93826b5caf3f8a7b0bbae05b1d2853d0578a6242dd52fcb3f2ffa6709d6bd5cd600ef537de741de85ce24c129aae9919191fd7784102af72d519462b104b6140f892a6346a0df4b21eb53a4f2dc2f305cff3e99ce764c319b0bd
    public exponent: 10001

] 
2021-11-25 11:25:16.966  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:25:16.971 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:25:16.974 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-25 11:25:16.975 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:25:16.975  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-25 11:25:16.976  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:25:16.977  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:25:16.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:25:16.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:25:16.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:25:16.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:25:16.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:25:16.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:25:16.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:25:17.171  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:25:17.172  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:25:17.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:25:17.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:25:17.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:25:17.176  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:25:17.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:25:17.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:25:17.178 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:25:17.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:25:17.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:25:17.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:25:17.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:25:17.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:25:17.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:25:17.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:25:17.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:cc:9f:bf:da:9c:aa:b0:53:31:77:cc:43:9b:6f:3e:a5:23:eb:fe]
            modulus: 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
    public exponent: 10001

] 
2021-11-25 11:25:51.189  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:25:51.192 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:25:51.194 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-25 11:25:51.195 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:25:51.201  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-25 11:25:51.205  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:25:51.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:25:51.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:25:51.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:25:51.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:25:51.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:25:51.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:25:51.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:25:51.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:25:51.410  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:25:51.411  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:25:51.412 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:25:51.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:25:51.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:25:51.419  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:25:51.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:25:51.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:25:51.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:25:51.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:25:51.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:25:51.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:25:51.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:25:51.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:25:51.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:25:51.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:25:51.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:94:54:5d:3a:3c:8d:4c:63:fc:d7:85:58:6a:88:63:f7:19:f0:4d]
            modulus: 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
    public exponent: 10001

] 
2021-11-25 11:26:39.714  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:26:39.717 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:26:39.719 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-25 11:26:39.719 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:26:39.720  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-25 11:26:39.721  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:26:39.722  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:26:39.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:26:39.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:26:39.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:26:39.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:26:39.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:26:39.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:26:39.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:26:39.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:26:39.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:26:39.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:26:39.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:26:39.879  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:26:39.879  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:26:39.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:26:39.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:26:39.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:26:39.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:26:39.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:26:39.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:26:39.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:26:39.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:26:39.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:26:39.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:26:39.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:68:b8:54:af:0d:b3:9b:1a:b3:b1:09:69:45:29:86:53:bb:2b:99]
            modulus: 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
    public exponent: 10001

] 
2021-11-25 11:27:37.403  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:27:37.407 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:27:37.409 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-25 11:27:37.410 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:27:37.411  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-25 11:27:37.412  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:27:37.412  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:27:37.413 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:27:37.413 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:27:37.414 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:27:37.419 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:27:37.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:27:37.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:27:37.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:27:37.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:27:37.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:27:37.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:27:37.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:27:37.561  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:27:37.562  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:27:37.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:27:37.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:27:37.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:27:37.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:27:37.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:27:37.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:27:37.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:27:37.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:27:37.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:27:37.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:27:37.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:10:b0:45:2d:2c:d6:05:d9:61:b2:7b:4d:aa:8d:2a:61:56:ce:71]
            modulus: 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
    public exponent: 10001

] 
2021-11-25 11:28:11.963  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:28:11.966 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:28:11.968 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-25 11:28:11.969 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:28:11.969  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-25 11:28:11.976  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:28:11.976  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:28:11.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:28:11.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:28:11.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:28:11.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:28:11.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:28:11.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:28:11.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:28:12.213  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:28:12.214  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:28:12.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:28:12.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:28:12.217  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:28:12.217  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:28:12.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:28:12.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:28:12.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:28:12.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:28:12.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:28:12.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:28:12.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:28:12.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:28:12.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:28:12.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:28:12.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: dc4794fae67925c49cb39416f3bb3c7288d565ff777507f390c67bc5fc80bfbad61a178ab77cc0b8eea366d05a0770ba5d83d9be92a1291a7aabbf54b448223ee6090ea19b215983db4b2fe7d9dff5db03d7a50c33932bbef63e69fbe8c53151e537c84a4e50cb98e9516adc263e167d66ddddcc79b305bb5c2cac2dd6eda0c18db85519001021b00467bce80b4ba62bad95b783794b2e520fc0047c1509aa1187317bbde2edf0b7256706064214f02b950a60cf9e7c1ccd2e365ae1173df58b269cd5bccbce58860eb87dfaf6d27ceeedd1b6d2c511d820e4f66d27c03fd1477cbcab49f9e4674f8ccb828509c00787ce4615a46145993470ed2e13633ff8d3da784050889ec3177cef3b1d491b2d5ef3a6ee68bdb46c98fd6b883976701b93a35cb8ee5baad470efa7270a1f2113c3184c3e043a59fa43c3bcf5b0aafe9a49f6040752403b84ac0a9fcbb9df8430b340b1d1145e5fb196d1b71adcc18ebfcd6517161b78d5d05328a0ff8bbc5f8997142e0daaf2dad968435c4c06cf35d04f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:a7:94:74:39:28:03:cd:54:51:25:7a:05:c5:4e:ab:e4:74:27:f6]
            modulus: ac4bdffb516496e3f4728d209d4668c414e95d57db7cc8bfa0d5ceb4c138870fadbcb134a522348ca4ee76b82ff88a87b74b5f33d4b4a3f2c50eb98654d89f7ca9a36e396dd26e1b9b80ae08bcf88075e5bac84c877c838020f12b8a80497eae0ae86b2776bac64b4e3339d4ce540a9ef5aa3f2a47d331331defb39404a21de64f419a4f1e64c73c025a0c100001cf926929f0a4a7f83d4906e3e467255245dafad14777ba96f32309f653a390e91ceae5a4c0c67b4c514be3161c04441d25e97b33787a25fb1c49af72b80bf4f9a741a43a34cc6eb2941db36d2e6fb90c3462496945ca4a304b0b96282f340cb47955930820f8147062daae6c1b1d54ea226b
    public exponent: 10001

] 
2021-11-25 11:29:45.359  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-25 11:29:45.363 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-25 11:29:45.367 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-25 11:29:45.369 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-25 11:29:45.370  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-25 11:29:45.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-25 11:29:45.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-25 11:29:45.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-25 11:29:45.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-25 11:29:45.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-25 11:29:45.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-25 11:29:45.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:29:45.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-25 11:29:45.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:29:45.574  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-25 11:29:45.575  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-25 11:29:45.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-25 11:29:45.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-25 11:29:45.577  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-25 11:29:45.578  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-25 11:29:45.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:29:45.579 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:29:45.579 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:29:45.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:29:45.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:29:45.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:29:45.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-25 11:29:45.582 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-25 11:29:45.582 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-25 11:29:45.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-25 11:29:45.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 609878757722616242300516324844331684222108256990
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 25 09:17:32 UTC 2021
           Final Date: Tue Nov 25 09:17:31 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a5:2a:cc:00:2a:01:3a:fc:54:d3:49:af:41:1e:fa:74:e6:8c:ad]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c1452292ef90e1f983983ca476aec17f5db26e95
                       6b86d175868f5ef91f959287c3862a888d2cd622
                       480cea02191959a3798ac6f0c6b7e5f7a6b4623a
                       e4121ca4ea7901e392947e0248f67f6dbb38de4d
                       edc3b5e9e0e7087fd5e9d8f68b9ba29767b9b4e2
                       3f99d134baf04df91d8610304636eec7feae4db3
                       d78cc81a972ecce6870e561c850f3be3d2fc4108
                       10946f0aaaf108ed3e12200ad84fb2efe1c35f97
                       0c6f9b2aaafe2e5940a39d676e7c4fba5564600d
                       2a8d5732c23c154245c9340e896864e9189df373
                       0bd5d77416ead1596d55ef4ed065c56436441630
                       ad7775d432fb4f3295a17d2041bfc3f7f9171a7a
                       53e1d210fbb8ad33b1470fbe3903c8ed24dfddf2
                       2328c458a548f0d3b98809d421a557e51d4499c5
                       2a0c4ca298247ef89512cdb6f4b2e80530edd697
                       66685d48ccad83a91b3c63da35b89de17f316222
                       1bb43f31ab56b8e369216d485f719030e0df830d
                       f74b511b032e8c9e49b3e1731a8394d867b83756
                       61aef792901ff5f1e5918d0184ba764d25333a33
                       32b9b5e7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:9b:67:7a:c1:a7:6c:09:f9:c5:d4:61:66:58:fe:24:c7:64:e1:42]
            modulus: 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
    public exponent: 10001

]