Results

By type

          2021-11-27 09:21:47,055 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-27 09:21:48,088 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-27 09:21:48.884  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-27 09:21:52.067 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-27 09:21:52.370  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-27 09:21:52.526  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-27 09:21:54.850  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.565 seconds (JVM running for 10.459)
2021-11-27 09:22:51.399  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 09:22:51.411 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 09:22:51.463 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-27 09:22:51.468 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 09:22:51.493  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-27 09:22:51.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 09:22:51.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 09:22:51.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 09:22:51.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 09:22:51.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 09:22:51.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 09:22:51.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 09:22:51.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 09:22:51.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 09:22:51.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 09:22:51.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 09:22:52.164  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 09:22:52.169  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 09:22:52.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 09:22:52.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 09:22:52.188  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 09:22:52.189  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 09:22:52.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 09:22:52.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 09:22:52.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 09:22:52.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 09:22:52.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 09:22:52.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 09:22:52.217 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 09:22:52.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 09:22:52.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 09:22:52.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 09:22:52.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:5c:4f:7e:fc:3f:5b:09:eb:82:e2:45:5a:6b:e6:ea:fd:a1:79:3d]
            modulus: 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
    public exponent: 10001

] 
2021-11-27 11:19:42.614  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:19:42.618 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:19:42.622 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-27 11:19:42.623 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:19:42.624  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-27 11:19:42.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:19:42.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:19:42.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:19:42.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:19:42.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:19:42.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:19:42.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:19:42.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:19:42.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:19:42.897  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:19:42.898  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:19:42.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:19:42.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:19:42.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:19:42.903  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:19:42.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:19:42.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:19:42.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:19:42.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:19:42.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:19:42.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:19:42.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:19:42.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:19:42.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:19:42.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:19:42.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:fc:20:f7:84:98:62:61:f0:58:6e:f3:e2:98:14:e4:4b:db:ca:b8]
            modulus: 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
    public exponent: 10001

] 
2021-11-27 11:22:36.179  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:22:36.181 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:22:36.183 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-27 11:22:36.184 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:22:36.185  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-27 11:22:36.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:22:36.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:22:36.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:22:36.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:22:36.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:22:36.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:22:36.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:22:36.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:22:36.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:22:36.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:22:36.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:22:36.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:22:36.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:22:36.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:22:36.602  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:22:36.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:22:36.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:22:36.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:22:36.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:22:36.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:22:36.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:22:36.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:22:36.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:22:36.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:22:36.608 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:22:36.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:a0:d6:3d:61:c4:c1:f4:65:55:91:cc:db:a9:12:e0:ab:d2:c2:61]
            modulus: b9078c77afabf974a87df856d53dfe2f7f4bb8beeebc19c6a0001d60ef32d34e914322ed5567151290420b99e7032b266d0d8581c33fc82753d6e21c0a8dc776c29ad7830679c799f04084137376b8667e655326cde89ced592fb7fd5d0cd72d2f778c97f696d2b46be29399efc3caa741b80356228271b29b308edc1d7f0554e95dfffc81669e440f144c12da766e53aabf47e7808463f6ca1dc86ee4cb9537be40c0cf50afd01592a3c60817ab361af966ef0b6e091f5aedcf0b1a5457afa879e7d515310f500997273aa0d70cebf236e6bd33223c16136ae5ad0cfe9bfb0d8bbd92af7534e474f540e16c953178dc233f7a6d50b0c773f10a453a06cc9bc5
    public exponent: 10001

] 
2021-11-27 11:23:58.537  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:23:58.540 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:23:58.543 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-27 11:23:58.544 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:23:58.545  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-27 11:23:58.546  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:23:58.547  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:23:58.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:23:58.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:23:58.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:23:58.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:23:58.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:23:58.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:23:58.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:23:58.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:23:58.757  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:23:58.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:23:58.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:23:58.761  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:23:58.762  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:23:58.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:23:58.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:23:58.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:23:58.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:23:58.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:23:58.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:23:58.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:23:58.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:23:58.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:23:58.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:23:58.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: ac54eac997b36b2b0dd97a1b8bdf4ee34c326f36c5c4d9dc279d46b55e0d518b00fb664ca31f444b4b57413246968c6d9f735adc3d280df979f310392706e9bb0782289b2428098f2d0dc018473c99763ccdb84c47ef3c352707b31a67a96e9344deec565947e12484947e20ec8c26fa082134eb97ad9af777901025b61a8e107cf7dc56e27a20c889a10eb46b55df04111bada82d877d218204d6a0d31d68ae3a1fd12f1cbfbf63250efb03fbdda83a06adfd11aa2d8dc2d9c0fb3d951c43525eecdac4435cac200ab6281e604fcd680779960410e21956c12659f24640143a090dbd9606f94b089363cb62f9881afc959054c9b277a0f51f5df241fdc76275f34c3e376d00e39d675afd3fbbdac25f32777d970360143543de51e27b71af01d07302d04a0d3519f9fb17713294f456fa4e39761a099c093720b9f3a2e8d09732d904226250f404dae5515c9a5cd5edacb0efc17efdd3b1ab84da455ae869a9e929e73631dfa39c11864eb04d9e629896a6b5897b7cfb6507713357ad6877e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:71:62:33:8d:7c:70:84:33:24:2f:83:33:bd:93:2f:d8:83:9d:c4]
            modulus: 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
    public exponent: 10001

] 
2021-11-27 11:24:28.730  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:24:28.732 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:24:28.741 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-27 11:24:28.743 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:24:28.743  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-27 11:24:28.745  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:24:28.745  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:24:28.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:24:28.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:24:28.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:24:28.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:24:28.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:24:28.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:24:28.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:24:28.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:24:28.896  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:24:28.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:24:28.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:24:28.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:24:28.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:24:28.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:24:28.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:24:28.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:24:28.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:24:28.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:24:28.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:24:28.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:24:28.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:24:28.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:24:28.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:24:28.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:a5:fb:dc:08:c5:00:73:4c:3a:32:1d:d7:a7:ae:02:b1:6d:7a:57]
            modulus: d6e6ff6069fa2b6408590ed074f71d7b505aacf10c9969452e3002d1443e1b6889eadf98335fbe1579380caca0408c85477616613420192d4c98d09953aa330294dd6dedd4b6d6124edddfec01575c3aaf1d1e681dc0c4dcc09baa81e8a5c7d84946cc4c3cf1e4ea31687b44d2517c745a04563becedf081166df0388ccbede6a8c60ee8a3b5a6f70925b868f2531d969c0ee7cf222ac89a1e2cbeb6d3853b106561d097bc5cdf33f7b62c98a9f96f3164a0fbc896e4545e052c884dbf49469d17e69cb7a1f785cabdb964fcf580f044b1be7ce83101be3456e4687f2d9bf2378636f6c7d3fa5a9db7a73000af2f650d20effd48f6dd352390890ee7c80a585b
    public exponent: 10001

] 
2021-11-27 11:24:30.911  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:24:30.913 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:24:30.916 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-27 11:24:30.916 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:24:30.917  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-27 11:24:30.918  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:24:30.919  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:24:30.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:24:30.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:24:30.921 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:24:30.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:24:30.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:24:30.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:24:30.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:24:31.026  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:24:31.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:24:31.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:24:31.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:24:31.029  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:24:31.030  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:24:31.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:24:31.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:24:31.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:24:31.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:24:31.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:24:31.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:24:31.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:24:31.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:24:31.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:24:31.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:24:31.042 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:29:81:d2:9c:d9:06:f1:7f:80:68:a2:7c:2c:0a:d5:9c:d1:ad:1f]
            modulus: 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
    public exponent: 10001

] 
2021-11-27 11:25:05.092  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:25:05.094 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:25:05.096 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-27 11:25:05.097 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:25:05.098  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-27 11:25:05.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:25:05.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:25:05.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:25:05.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:25:05.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:25:05.105 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:25:05.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:25:05.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:25:05.107 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:25:05.320  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:25:05.321  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:25:05.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:25:05.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:25:05.325  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:25:05.325  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:25:05.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:25:05.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:25:05.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:25:05.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:25:05.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:25:05.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:25:05.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:25:05.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:25:05.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:25:05.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:25:05.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:60:42:64:a3:48:f0:9b:dc:17:e8:79:b9:b1:de:aa:4a:ab:79:12]
            modulus: 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
    public exponent: 10001

] 
2021-11-27 11:26:42.166  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:26:42.168 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:26:42.171 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-27 11:26:42.172 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:26:42.174  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-27 11:26:42.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:26:42.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:26:42.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:26:42.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:26:42.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:26:42.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:26:42.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:26:42.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:26:42.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:26:42.358  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:26:42.359  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:26:42.360 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:26:42.360 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:26:42.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:26:42.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:26:42.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:26:42.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:26:42.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:26:42.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:26:42.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:26:42.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:26:42.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:26:42.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:26:42.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:26:42.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:26:42.392 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: ac54eac997b36b2b0dd97a1b8bdf4ee34c326f36c5c4d9dc279d46b55e0d518b00fb664ca31f444b4b57413246968c6d9f735adc3d280df979f310392706e9bb0782289b2428098f2d0dc018473c99763ccdb84c47ef3c352707b31a67a96e9344deec565947e12484947e20ec8c26fa082134eb97ad9af777901025b61a8e107cf7dc56e27a20c889a10eb46b55df04111bada82d877d218204d6a0d31d68ae3a1fd12f1cbfbf63250efb03fbdda83a06adfd11aa2d8dc2d9c0fb3d951c43525eecdac4435cac200ab6281e604fcd680779960410e21956c12659f24640143a090dbd9606f94b089363cb62f9881afc959054c9b277a0f51f5df241fdc76275f34c3e376d00e39d675afd3fbbdac25f32777d970360143543de51e27b71af01d07302d04a0d3519f9fb17713294f456fa4e39761a099c093720b9f3a2e8d09732d904226250f404dae5515c9a5cd5edacb0efc17efdd3b1ab84da455ae869a9e929e73631dfa39c11864eb04d9e629896a6b5897b7cfb6507713357ad6877e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:ae:90:5b:ee:d8:1c:a4:17:41:10:fb:45:62:ef:b5:60:2b:ec:9a]
            modulus: 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
    public exponent: 10001

] 
2021-11-27 11:26:51.508  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-27 11:26:51.510 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-27 11:26:51.511 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-27 11:26:51.512 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-27 11:26:51.513  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-27 11:26:51.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-27 11:26:51.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-27 11:26:51.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-27 11:26:51.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-27 11:26:51.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-27 11:26:51.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-27 11:26:51.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:26:51.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-27 11:26:51.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:26:51.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-27 11:26:51.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-27 11:26:51.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-27 11:26:51.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-27 11:26:51.626  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-27 11:26:51.627  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-27 11:26:51.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:26:51.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:26:51.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:26:51.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:26:51.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:26:51.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:26:51.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-27 11:26:51.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-27 11:26:51.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-27 11:26:51.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-27 11:26:51.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693787797679024414205217605569257487790409193029
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 27 09:17:26 UTC 2021
           Final Date: Thu Nov 27 09:17:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:7b:4f:ec:bf:f0:93:cb:49:19:2b:fa:41:8d:de:30:be:ea:bf:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5e2dde684404d29ff56d8e9c151060bed0de0df2
                       2df00ba43811fa418205becfa01b8e9ea3b2878d
                       cbd6dc9b4c5071fae754bfbc03642d8b86e9972e
                       73dfbf9dd95430bf7dc1fe6c89727f0f9264c67c
                       edb4692b30f8b15a98b7cabd8385b45c5b16a0b2
                       13d1d44ce37842fae5ff3c31b60ba3b5bff54d70
                       046f5cc318dcbbca5e0c55f106bf130edb3706a2
                       41142dbce5a7787b3f4f51e19a0a98b5c6332e53
                       b42e60edf36a444a10b0401f149863aaa773ef95
                       07a9d7cd82753ca01d4878fc8e95c5596fcde460
                       e4d0292b3e7b175434366d65c41a1017ed214a93
                       0f3ee5a69c9b72cc2edf2ed56e1e407db2883709
                       50868f5746eeaee999e3e44e7f3a5b3207cf9607
                       9ee8d289cf2b99cfcf11f88f3cc17f88e721696c
                       8d1fa47c013259523050fa6ac49e27fcd9e1602a
                       ee947a1249a47f6fda4edd51a06a50a070241c35
                       6cd96fc0110caed3ae312bea9213ff33d806f1fd
                       870b3edaf6ea0e454c1cca94a2e0be3efcc96590
                       4d66245ba0fda0ec02a2c8a40b7b7a3deaecb65e
                       3cfe1776
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:4b:e7:d4:83:f5:ff:a4:6d:9f:7f:bf:a0:68:58:9f:6d:49:dd:24]
            modulus: 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
    public exponent: 10001

]