Results

By type

          2021-11-15 02:50:05,841 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-15 02:50:10,138 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-15 02:50:13.426  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-15 02:50:29.046 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-15 02:50:30.228  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-15 02:50:31.037  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-15 02:50:44.839  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 41.709 seconds (JVM running for 49.561)
2021-11-15 02:51:13.432  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 02:51:13.440 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 02:51:13.632 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-15 02:51:13.635 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 02:51:13.731  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-15 02:51:13.735  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 02:51:13.736  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 02:51:13.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 02:51:13.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 02:51:13.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 02:51:13.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 02:51:13.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 02:51:14.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 02:51:14.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 02:51:14.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 02:51:14.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 02:51:15.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 02:51:15.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 02:51:15.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 02:51:15.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 02:51:15.492  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 02:51:15.493  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 02:51:15.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 02:51:15.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 02:51:15.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 02:51:15.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 02:51:15.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 02:51:15.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 02:51:15.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 02:51:15.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 02:51:15.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 02:51:15.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 02:51:15.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:d6:ee:5e:6c:a8:be:e8:bd:68:b0:61:a9:82:30:ec:f8:26:59:4f]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:31:08.019  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:31:08.020 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:31:08.022 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-15 04:31:08.023 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:31:08.025  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-15 04:31:08.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:31:08.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:31:08.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:31:08.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:31:08.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:31:08.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:31:08.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:31:08.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:31:08.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:31:08.137  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:31:08.138  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:31:08.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:31:08.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:31:08.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:31:08.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:31:08.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:31:08.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:31:08.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:31:08.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:31:08.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:31:08.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:31:08.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:31:08.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:31:08.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:31:08.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:31:08.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:e4:ef:df:35:ab:44:eb:fc:04:9e:29:23:dc:b5:9b:0c:62:69:81]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:33:13.146  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:33:13.147 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:33:13.149 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 04:33:13.149 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:33:13.150  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 04:33:13.150  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:33:13.150  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:33:13.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:33:13.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:33:13.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:33:13.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:33:13.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:33:13.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:33:13.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:33:13.325  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:33:13.325  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:33:13.326 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:33:13.326 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:33:13.328  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:33:13.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:33:13.329 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:33:13.330 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:33:13.330 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:33:13.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:33:13.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:33:13.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:33:13.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:33:13.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:33:13.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:33:13.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:33:13.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:b6:dd:49:44:78:d8:5a:38:9f:31:54:20:3c:c8:74:ce:30:10:10]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:35:58.762  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:35:58.763 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:35:58.765 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 04:35:58.765 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:35:58.766  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 04:35:58.766  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:35:58.766  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:35:58.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:35:58.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:35:58.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:35:58.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:35:58.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:35:58.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:35:58.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:35:58.924  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:35:58.925  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:35:58.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:35:58.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:35:58.929  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:35:58.929  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:35:58.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:35:58.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:35:58.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:35:58.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:35:58.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:35:58.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:35:58.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:35:58.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:35:58.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:35:58.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:35:58.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:7d:fb:19:ef:53:22:60:fb:d5:cc:bd:37:fb:ed:40:cf:61:69:cc]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:36:22.990  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:36:22.992 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:36:22.993 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 04:36:22.994 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:36:22.994  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-15 04:36:22.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:36:22.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:36:22.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:36:22.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:36:22.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:36:23.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:36:23.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:36:23.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:36:23.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:36:23.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:36:23.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:36:23.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:36:23.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:36:23.125  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:36:23.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:36:23.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:36:23.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:36:23.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:36:23.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:36:23.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:36:23.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:36:23.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:36:23.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:36:23.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:36:23.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:36:23.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:aa:14:1e:e2:a8:63:d2:c5:d6:db:8a:bf:b8:d7:2e:59:0f:6f:1f]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:36:28.101  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:36:28.102 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:36:28.103 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-15 04:36:28.104 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:36:28.104  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-15 04:36:28.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:36:28.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:36:28.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:36:28.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:36:28.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:36:28.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:36:28.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:36:28.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:36:28.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:36:28.188  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:36:28.189  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:36:28.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:36:28.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:36:28.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:36:28.191  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:36:28.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:36:28.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:36:28.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:36:28.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:36:28.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:36:28.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:36:28.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:36:28.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:36:28.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:36:28.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:36:28.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:ee:91:c9:77:a8:e9:a1:d5:bb:98:7a:ad:cb:4a:de:c5:6a:5c:4e]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:37:01.710  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:37:01.711 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:37:01.712 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-15 04:37:01.713 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:37:01.713  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-15 04:37:01.714  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:37:01.714  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:37:01.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:37:01.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:37:01.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:37:01.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:37:01.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:37:01.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:37:01.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:37:01.824  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:37:01.824  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:37:01.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:37:01.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:37:01.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:37:01.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:37:01.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:37:01.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:37:01.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:37:01.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:37:01.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:37:01.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:37:01.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:37:01.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:37:01.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:37:01.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:37:01.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:e9:21:e8:88:c2:40:b2:10:7b:1d:44:fa:0b:1d:49:ee:77:9a:86]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:38:15.860  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:38:15.861 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:38:15.862 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-15 04:38:15.863 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:38:15.863  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-15 04:38:15.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:38:15.864  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:38:15.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:38:15.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:38:15.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:38:15.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:38:15.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:38:15.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:38:15.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:38:16.000  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:38:16.000  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:38:16.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:38:16.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:38:16.003  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:38:16.004  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:38:16.005 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:38:16.005 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:38:16.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:38:16.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:38:16.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:38:16.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:38:16.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:38:16.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:38:16.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:38:16.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:38:16.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:ef:30:c1:e9:43:68:b7:82:95:2f:35:73:84:cd:5e:a7:f8:21:0e]
            modulus: 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
    public exponent: 10001

] 
2021-11-15 04:39:39.862  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-15 04:39:39.863 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-15 04:39:39.865 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 04:39:39.866 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-15 04:39:39.866  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-15 04:39:39.867  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-15 04:39:39.867  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-15 04:39:39.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-15 04:39:39.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-15 04:39:39.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-15 04:39:39.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-15 04:39:39.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:39:39.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-15 04:39:39.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:39:39.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-15 04:39:39.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-15 04:39:39.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-15 04:39:39.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-15 04:39:39.955  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-15 04:39:39.956  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-15 04:39:39.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:39:39.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:39:39.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:39:39.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:39:39.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:39:39.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:39:39.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-15 04:39:39.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-15 04:39:39.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-15 04:39:39.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-15 04:39:39.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695339263132434025981721934369184940499916573472
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 15 02:44:53 UTC 2021
           Final Date: Sat Nov 15 02:44:52 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [31:e5:e0:f8:8f:3c:3d:1d:d4:c7:bc:e4:12:5f:12:aa:27:30:c9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 843520ad3e4a32a52e0b42b55cc3f04699b3efcc
                       a41582bf6ecc6b2693a10260f290ab6143eea286
                       1daf28a707a3c5816fa11e4c626c62028b28fe78
                       2c53887425130f1028c9a94caa74fd3d7b56f82a
                       276ff83531a28d7bec5b92b1491d54a5797a26ad
                       fb5f535b5e970eb25100f21bbc5b9b88eef7d47a
                       0e29a08edab4feac8d60b8d50b3b5ceb6f01ec33
                       f67360eafc65a0ad3902d88fa84956f27bde6b1a
                       ed1e2955598b78af0923919b7d69f617b981469e
                       08ba068dec05f8142c0556f80d71bbcaaf40adbf
                       ee2a10336c52bb3aa42b3a418b3c47f1e5e8ec30
                       52ed797006fb7ae9de4283d271a3e52639509d8e
                       9bbe30fd81d22689b3f2f90c826eb85178eaf175
                       f714044b664bd51b30b3af340654c3f08d3e2f7d
                       87e1a682c99b64a1c99d31748e71904cd534868b
                       f848d121c49f1452061c1929853e8c2da4d4a756
                       de7af0c7b2881f6c469f7193bf2971fe8194fbef
                       d618d840d1a1bd9eb6f5d87aba53f460f7484a2b
                       243c8e29b1cfde779cd8c78579c50a62fa53c4ba
                       2eeb93f8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:85:57:72:d9:dd:7a:f5:36:6a:04:e6:a6:0b:8a:41:db:66:67:77]
            modulus: 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
    public exponent: 10001

]