Results

By type

          2021-11-13 03:03:59,596 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-13 03:04:04,297 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-13 03:04:07.613  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-13 03:04:22.799 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-13 03:04:24.008  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-13 03:04:24.699  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-13 03:04:37.403  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.495 seconds (JVM running for 48.435)
2021-11-13 03:05:08.216  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 03:05:08.303 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 03:05:08.415 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-13 03:05:08.418 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 03:05:08.504  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-13 03:05:08.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 03:05:08.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 03:05:08.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 03:05:08.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 03:05:08.603 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 03:05:08.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 03:05:08.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 03:05:08.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 03:05:08.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 03:05:08.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 03:05:08.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 03:05:10.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 03:05:10.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 03:05:10.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 03:05:10.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 03:05:10.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 03:05:10.704  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 03:05:10.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 03:05:10.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 03:05:10.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 03:05:10.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 03:05:10.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 03:05:10.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 03:05:10.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 03:05:10.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 03:05:10.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 03:05:10.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 03:05:11.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:64:39:a6:49:43:9b:88:7f:9c:6c:01:5d:83:3e:01:b8:35:b2:62]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:40:47.743  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:40:47.745 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:40:47.747 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-13 04:40:47.748 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:40:47.794  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-13 04:40:47.796  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:40:47.797  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:40:47.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:40:47.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:40:47.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:40:47.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:40:47.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:40:47.903 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:40:47.904 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:40:48.115  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:40:48.116  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:40:48.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:40:48.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:40:48.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:40:48.123  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:40:48.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:40:48.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:40:48.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:40:48.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:40:48.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:40:48.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:40:48.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:40:48.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:40:48.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:40:48.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:40:48.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:76:f0:a3:f3:02:0b:0b:fa:63:95:1a:32:ac:59:2e:3a:df:d2:a6]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:45:45.574  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:45:45.576 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:45:45.578 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:45:45.579 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:45:45.580  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:45:45.581  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:45:45.581  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:45:45.593 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:45:45.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:45:45.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:45:45.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:45:45.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:45:45.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:45:45.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:45:45.684  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:45:45.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:45:45.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:45:45.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:45:45.694  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:45:45.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:45:45.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:45:45.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:45:45.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:45:45.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:45:45.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:45:45.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:45:45.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:45:45.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:45:45.700 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:45:45.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:45:45.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 86e47d1123c5fe34cb1ca47fb565ea878b23b6e39429ed860d6b14dfe87e79900f81495944708efc638261e35b3973bdf00288d8db17782a703c04a09166dd41cc58ffae1eba0879347c7e42d3428755acb12356c90e1350bd026008e041a3aedb8faaf82c83c20cced75d134b5d21e560f78b060d822f299846ae9294e671b50f0f81a8ba10faedb1f50533066031533595e6251c68bcb5f30e60ff9c04a457d2e688d4be134176a0dc07deaffcfb92332cf89b133bb05a31d278fafd596f216a769d275236cf1f9adddb84f3fac93c32809c30441fe4c8626858bb6e184d12150c5a1af92340da3dda0c114becc0fc31d813d823336481f2417760339648f162f9b3987b4bbb95f1b3347322b0b302dad4a34d83576eef4fb4aacfd55b99a43c23b005932aaa542cef259dd3c12c71bdb621a46425487b5d46c88e998cc8ca485f64fdb4c223846512341f5d006e9987850a6ce03fa9a993a9de0b2799064a38c79c725a0f3914d266dee9314c8f4eae0f756d2a45284b3786d0c4174c09d7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:b3:2b:af:89:96:1b:5f:6b:c7:8c:49:d5:e1:f4:7f:a0:f3:1d:ae]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:46:13.898  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:46:13.899 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:46:13.900 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:46:13.901 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:46:13.901  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:46:13.902  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:46:13.902  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:46:13.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:46:13.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:46:13.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:46:13.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:46:13.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:46:13.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:46:13.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:46:13.981  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:46:13.993  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:46:13.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:46:13.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:46:13.996  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:46:13.997  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:46:13.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:13.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:13.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:13.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:14.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:14.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:14.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:14.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:14.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:14.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:46:14.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:c9:03:6c:91:8d:d4:b7:25:fa:43:e0:c5:86:fc:9a:96:9f:34:4d]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:46:18.595  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:46:18.596 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:46:18.598 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-13 04:46:18.599 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:46:18.599  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-13 04:46:18.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:46:18.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:46:18.600 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:46:18.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:46:18.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:46:18.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:46:18.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:46:18.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:46:18.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:46:18.679  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:46:18.680  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:46:18.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:46:18.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:46:18.693  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:46:18.694  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:46:18.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:18.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:18.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:18.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:18.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:18.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:18.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:18.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:18.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:18.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:46:18.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:bc:e2:57:91:bd:1b:b6:2d:a8:f4:69:84:a3:74:74:cb:57:4b:c0]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:46:51.626  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:46:51.628 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:46:51.630 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-13 04:46:51.630 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:46:51.631  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-13 04:46:51.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:46:51.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:46:51.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:46:51.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:46:51.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:46:51.637 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:46:51.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:46:51.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:46:51.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:46:51.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:46:51.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:46:51.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:46:51.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:46:51.794  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:46:51.795  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:46:51.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:51.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:51.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:51.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:51.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:51.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:51.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:46:51.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:46:51.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:46:51.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:46:51.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:16:af:de:51:03:d8:72:d5:e8:09:2c:86:cc:47:45:08:0f:38:bc]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:48:05.521  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:48:05.522 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:48:05.524 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:48:05.525 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:48:05.525  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:48:05.526  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:48:05.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:48:05.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:48:05.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:48:05.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:48:05.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:48:05.592 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:48:05.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:48:05.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:48:05.693  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:48:05.694  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:48:05.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:48:05.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:48:05.697  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:48:05.698  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:48:05.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:48:05.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:48:05.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:48:05.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:48:05.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:48:05.701 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:48:05.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:48:05.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:48:05.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:48:05.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:48:05.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:9f:80:24:2e:4b:15:47:ba:71:fc:06:a4:a0:8b:e0:23:2e:4e:ac]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:49:36.968  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:49:36.970 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:49:36.973 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:49:36.973 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:49:36.974  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:49:36.975  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:49:36.975  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:49:36.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:49:36.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:49:36.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:49:36.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:49:36.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:49:36.999 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:49:36.999 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:49:37.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:49:37.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:49:37.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:49:37.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:49:37.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:49:37.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:49:37.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:49:37.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:49:37.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:49:37.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:49:37.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:49:37.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:49:37.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:49:37.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:49:37.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:49:37.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:49:37.107 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:39:45:e1:e5:f3:a5:8c:c3:f4:e6:d9:c8:af:d5:9d:eb:c4:92:05]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:50:17.188  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:50:17.189 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:50:17.190 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-13 04:50:17.191 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:50:17.191  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-13 04:50:17.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:50:17.192  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:50:17.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:50:17.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:50:17.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:50:17.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:50:17.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:50:17.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:50:17.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:50:17.280  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:50:17.281  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:50:17.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:50:17.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:50:17.283  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:50:17.283  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:50:17.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:50:17.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:50:17.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:50:17.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:50:17.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:50:17.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:50:17.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:50:17.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:50:17.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:50:17.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:50:17.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 343551989566274922912176400984286242354690153649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 03:00:28 UTC 2021
           Final Date: Thu Nov 13 03:00:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:9d:8c:63:3d:75:03:68:77:c1:d5:09:8e:09:ca:3b:5e:18:2e:7e]
            modulus: 86e47d1123c5fe34cb1ca47fb565ea878b23b6e39429ed860d6b14dfe87e79900f81495944708efc638261e35b3973bdf00288d8db17782a703c04a09166dd41cc58ffae1eba0879347c7e42d3428755acb12356c90e1350bd026008e041a3aedb8faaf82c83c20cced75d134b5d21e560f78b060d822f299846ae9294e671b50f0f81a8ba10faedb1f50533066031533595e6251c68bcb5f30e60ff9c04a457d2e688d4be134176a0dc07deaffcfb92332cf89b133bb05a31d278fafd596f216a769d275236cf1f9adddb84f3fac93c32809c30441fe4c8626858bb6e184d12150c5a1af92340da3dda0c114becc0fc31d813d823336481f2417760339648f162f9b3987b4bbb95f1b3347322b0b302dad4a34d83576eef4fb4aacfd55b99a43c23b005932aaa542cef259dd3c12c71bdb621a46425487b5d46c88e998cc8ca485f64fdb4c223846512341f5d006e9987850a6ce03fa9a993a9de0b2799064a38c79c725a0f3914d266dee9314c8f4eae0f756d2a45284b3786d0c4174c09d7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 41cf2de748941b03b36bd5dd3e075ffe56533e5f
                       b9d60d680ff062ca08093c0e12501ae2483b3513
                       8b4a99439fee0d469c2ed70b0df09f15ce960b48
                       dee3e769f154fdbc76d8751cbb7e0d631c4ee048
                       4969911df60ded617cd100cf3a74d9a83f649487
                       e7774cb3a938c65ecae5e12688e6f6b77a3dd2ec
                       29c78be90b46030d2626973803b80ea201aa2670
                       29e2accb0c645fa2f4eac321ce8a71781cc22dc2
                       e18e29275436012660ad25016a316a67ee0d3e21
                       7066986c0d8813e3231bfeeff9e1986514f3509c
                       7a74292e73cab6c1a449a55dc3004186a9c54761
                       ef1913b3d628848c4281052b686c84869e74e897
                       5c7df324c4ba7def8576cd49085927c2fcd74b6c
                       0d41f3672272a11e8a4d1b4e0a85dcff32f27fb0
                       f27074499d0b8cf82ea51381c11b37a002dfb250
                       7628684c5eda284912d12f8fff0ea31bbb1754e4
                       de88b381811dfdde87da45daedc1e55347c6e645
                       36f73e53eb03bf0b97c649aa2acf2e3f56ec5887
                       4b3b97e56db5658e61c1f2707cca7f000c194c58
                       e574deb8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:98:53:8b:5b:d9:d1:23:83:90:12:03:22:21:8e:a5:b4:72:8c:5b]
            modulus: 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
    public exponent: 10001

]