Results

By type

          2021-11-08 09:35:36,562 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-08 09:35:41,164 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-08 09:35:44.266  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-08 09:35:59.748 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-08 09:36:01.171  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-08 09:36:01.960  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-08 09:36:15.461  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 41.305 seconds (JVM running for 49.452)
2021-11-08 09:37:50.846  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 09:37:50.859 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 09:37:51.047 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-08 09:37:51.053 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 09:37:51.253  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-08 09:37:51.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 09:37:51.356  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 09:37:51.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 09:37:51.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 09:37:51.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 09:37:51.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 09:37:51.550 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 09:37:51.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 09:37:51.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 09:37:51.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 09:37:51.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 09:37:53.448  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 09:37:53.454  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 09:37:53.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 09:37:53.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 09:37:53.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 09:37:53.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 09:37:53.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 09:37:53.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 09:37:53.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 09:37:53.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 09:37:53.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 09:37:53.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 09:37:53.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 09:37:53.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 09:37:53.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 09:37:53.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 09:37:53.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: b098bf99d278bb77cbb31e0fd0ea4a2892f5e2bb2d98df857bc6e2c7a6666e726086993ded82f6c3365c442c3704652b9a56d7f9cdb01e8fec158c297288f61f1ee52ebea6201f81195981767cee7582a3264b6bb91d8218d5250344fc9dbaf5c3d27f9484762cada3f98b4b4bab16b75697b51ee9ae5158441ed794785b2e8003ff3f0749bcb4e38fbd4923881e20819b1392330bdc78695ffd704775f0a632c5072b897688489f6212e65c6bc77a1d86be5e392f6502df61f8d228fea15cfc68dfad89eaaa85dcfd377762baf7981870dcb64e951a9bcec845e74e85cce56f39658530ed219273c8cadcb53b5611a208aee9d0dd1e063866db36645e89760a79fbe935560dbe3eed95a7cca6728cf14ae229a03d9aa39b6e9075997c3b9e94f034d7ce1a20a50c0ba8d0d63bee08315dcec57f7f582a7c81acffa925f9daea4b5e08f5707aff3e64c6176e7ee704faec7f0c273974e43802198c8eb34e6d145cca8b06eefafbbc6584aeb4655166a724eee46bfa9ae4ea6265a27d3195f9c1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:5d:07:96:d8:0e:9d:88:40:84:da:6b:3e:4c:39:cf:6e:87:b0:90]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 13:34:47.999  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:34:48.046 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:34:48.050 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-08 13:34:48.053 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:34:48.056  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-08 13:34:48.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:34:48.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:34:48.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:34:48.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:34:48.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:34:48.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:34:48.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:34:48.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:34:48.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:34:48.518  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:34:48.519  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:34:48.520 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:34:48.520 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:34:48.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:34:48.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:34:48.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:34:48.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:34:48.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:34:48.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:34:48.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:34:48.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:34:48.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:34:48.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:34:48.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:34:48.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:34:48.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:23:c1:2e:cf:57:58:69:54:0a:0a:50:58:32:56:55:00:f2:7a:f9]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 13:36:50.825  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:36:50.826 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:36:50.827 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 13:36:50.828 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:36:50.829  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 13:36:50.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:36:50.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:36:50.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:36:50.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:36:50.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:36:50.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:36:50.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:36:50.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:36:50.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:36:50.963  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:36:50.964  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:36:50.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:36:50.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:36:50.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:36:50.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:36:50.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:36:50.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:36:50.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:36:50.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:36:50.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:36:50.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:36:50.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:36:50.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:36:50.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:36:50.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:36:50.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:87:f5:06:9b:5a:84:17:f2:be:16:88:97:66:a2:92:cc:56:6c:3c]
            modulus: c429dcb2b7c8f9d6252c25cceb030f62bc97eaa7da1a98c399e9b359ad8fabff10ac97c1d7a46e845c46967d7ad891f540ccc4cddc34432aeeae95cec06524026dc1523041cebe2654cd2660ab15faba8ca7f76874e2de860b26a6114510707a693b6f37d0fce9336936d2446e55e5b405d4fd6e62c0f2bd0c345bd974d14d9adc6b54405fc0cd266bc0d725ef21e03c7ab8bd6d817fa061fd97ce39292eaa632e9340448d7042b7137ed205439c408e92168b74aa04d98f22a6a0150ed419d91219197f87bc94426d64f1bf8fc2551f95a1a7cf2586fe9543d2740ece65d78ead9fbc60559129158d517681c7e01b0f09d5dd3c19752f8c8798c392af3ddcc9
    public exponent: 10001

] 
2021-11-08 13:39:41.273  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:39:41.274 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:39:41.276 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 13:39:41.277 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:39:41.278  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 13:39:41.279  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:39:41.279  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:39:41.280 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:39:41.280 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:39:41.281 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:39:41.286 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:39:41.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:39:41.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:39:41.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:39:41.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:39:41.447  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:39:41.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:39:41.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:39:41.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:39:41.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:39:41.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:39:41.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:39:41.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:39:41.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:39:41.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:39:41.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:39:41.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:39:41.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:39:41.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:39:41.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:39:41.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: b098bf99d278bb77cbb31e0fd0ea4a2892f5e2bb2d98df857bc6e2c7a6666e726086993ded82f6c3365c442c3704652b9a56d7f9cdb01e8fec158c297288f61f1ee52ebea6201f81195981767cee7582a3264b6bb91d8218d5250344fc9dbaf5c3d27f9484762cada3f98b4b4bab16b75697b51ee9ae5158441ed794785b2e8003ff3f0749bcb4e38fbd4923881e20819b1392330bdc78695ffd704775f0a632c5072b897688489f6212e65c6bc77a1d86be5e392f6502df61f8d228fea15cfc68dfad89eaaa85dcfd377762baf7981870dcb64e951a9bcec845e74e85cce56f39658530ed219273c8cadcb53b5611a208aee9d0dd1e063866db36645e89760a79fbe935560dbe3eed95a7cca6728cf14ae229a03d9aa39b6e9075997c3b9e94f034d7ce1a20a50c0ba8d0d63bee08315dcec57f7f582a7c81acffa925f9daea4b5e08f5707aff3e64c6176e7ee704faec7f0c273974e43802198c8eb34e6d145cca8b06eefafbbc6584aeb4655166a724eee46bfa9ae4ea6265a27d3195f9c1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:e7:56:1c:1d:92:b0:81:5b:30:7f:5f:42:84:69:25:cf:d8:b7:fe]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 13:40:14.710  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:40:14.711 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:40:14.712 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-08 13:40:14.713 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:40:14.713  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-08 13:40:14.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:40:14.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:40:14.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:40:14.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:40:14.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:40:14.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:40:14.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:40:14.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:40:14.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:40:14.842  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:40:14.845  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:40:14.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:40:14.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:40:14.849  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:40:14.850  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:40:14.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:14.851 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:14.851 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:14.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:14.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:14.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:14.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:14.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:14.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:14.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:40:14.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:5f:c3:b7:ad:46:1f:82:fc:bd:53:a1:f5:e0:cb:a2:cd:df:cb:43]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 13:40:22.972  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:40:22.974 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:40:22.976 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 13:40:22.976 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:40:22.977  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 13:40:22.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:40:22.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:40:22.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:40:22.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:40:22.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:40:23.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:40:23.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:40:23.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:40:23.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:40:23.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:40:23.145  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:40:23.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:40:23.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:40:23.149  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:40:23.149  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:40:23.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:23.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:23.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:23.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:23.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:23.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:23.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:23.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:23.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:23.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:40:23.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:e8:6d:7f:b4:18:02:41:68:f9:f9:25:1e:2b:bc:0c:1c:97:39:be]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 13:40:47.454  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:40:47.456 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:40:47.457 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-08 13:40:47.458 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:40:47.458  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-08 13:40:47.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:40:47.460  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:40:47.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:40:47.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:40:47.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:40:47.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:40:47.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:40:47.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:40:47.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:40:47.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:40:47.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:40:47.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:40:47.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:40:47.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:40:47.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:40:47.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:47.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:47.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:47.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:47.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:47.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:47.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:40:47.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:40:47.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:40:47.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:40:47.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:ca:8b:d1:c6:44:32:20:aa:96:a2:a7:1d:c3:de:1f:37:be:8e:03]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 13:43:19.210  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:43:19.211 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:43:19.216 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 13:43:19.217 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:43:19.217  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 13:43:19.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:43:19.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:43:19.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:43:19.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:43:19.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:43:19.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:43:19.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:43:19.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:43:19.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:43:19.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:43:19.366  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:43:19.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:43:19.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:43:19.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:43:19.373  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:43:19.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:43:19.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:43:19.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:43:19.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:43:19.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:43:19.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:43:19.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:43:19.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:43:19.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:43:19.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:43:19.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:f0:b2:67:26:a9:5d:1a:4e:7f:6b:a2:3e:b7:ac:0e:11:6a:ed:f1]
            modulus: 9c20cbe7351e5b4792f735289ed419f51c5ac25053f055c2c8b3ba406906206e838b238b194e3becd244922b93706aec45663c5b602cd8507bc40039f73c0c28c319a0e310af14e8ec32ad5c20c8f5b893df81af53d8fff0fd2f235786b09cb3f0960377c03e5bfba4cdc268e2382cc8f48a8028ff3349c6386395409927058ea818625f9e9e436ff3aad26d165fa6301a6e40535dc21ba2a7adcdc1a0230836d7891a76d4d5b77db499fde2d72d0c522d4959c33979d1f9eef1389aa66fa5d85f500f6f822fb5e545fba02dd2dc2c0c80face62091460787d1cfbe90595fda995d1c015e21a280b0aebb470af1c88b4132fc7b0ce10ec84d59dcdf5ef01b841
    public exponent: 10001

] 
2021-11-08 13:43:57.354  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 13:43:57.360 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 13:43:57.362 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-08 13:43:57.363 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 13:43:57.363  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-08 13:43:57.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 13:43:57.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 13:43:57.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 13:43:57.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 13:43:57.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 13:43:57.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 13:43:57.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:43:57.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 13:43:57.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:43:57.477  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 13:43:57.478  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 13:43:57.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 13:43:57.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 13:43:57.481  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 13:43:57.481  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 13:43:57.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:43:57.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:43:57.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:43:57.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:43:57.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:43:57.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:43:57.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 13:43:57.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 13:43:57.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 13:43:57.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 13:43:57.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79877861029073742373355482048207764438485106978
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 09:22:53 UTC 2021
           Final Date: Sat Nov 08 09:22:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:5a:7a:2e:2f:dc:0d:0c:d7:ac:88:24:ca:85:1a:ee:08:95:a5:e9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44c4f89b80a69db005b1df26846ee13eea99bf12
                       5ee5082aaf418b05794ddd69d448010ae739fbdd
                       2cbd9c9871e2d8975196bee9ceeec420bd2983a2
                       ce34f61964dea3bb522b49206079ac2c5a69d262
                       76054e80aa8f48070d3c38335c85057ab2730e38
                       f35f465140b667b735a469562f53be31ed572a79
                       728b4eab2436d74634ea9315be00fb25563057f5
                       1569dc06b68b2914157ddc56e5a761fe48ae96f6
                       46f6938ef620490f656d8016004e757ddaf8d0ce
                       5cbcaf7925dbe3999b346bb0eefe387f0bc217ef
                       08eb583133f06dc148095a86099083c7f1b84e01
                       9de7f287a9fc17fe08c45e1f1d440eef658eb39a
                       f23fac50c3cc612c79b99dddd05bff67fc5aaffd
                       bfa264526e4c8cfbb55bc9db760238c30d511094
                       f70595af72033e230fd3f8184bb0265182fcad9c
                       e435493ef413f6c0cc18996f04cfd45cf978ff5c
                       33478a5bfd35721a58bfc881883cc17d93863378
                       db71910269d719edbb2ccdec1ffb2edc02d310c0
                       29ffa70d2d53c184b5f3d1f56ce5816262c28281
                       7fce6652
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:c3:7d:58:3e:93:55:0f:8c:7f:20:ce:85:5e:04:23:df:ee:d3:bd]
            modulus: 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
    public exponent: 10001

]