Results

By type

          2021-11-17 02:45:48,148 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-17 02:45:51,642 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-17 02:45:54.256  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-17 02:46:06.039 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-17 02:46:07.059  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-17 02:46:07.654  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-17 02:46:18.049  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.902 seconds (JVM running for 38.06)
2021-11-17 02:49:03.146  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 02:49:03.154 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 02:49:03.269 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-17 02:49:03.272 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 02:49:03.345  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-17 02:49:03.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 02:49:03.349  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 02:49:03.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 02:49:03.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 02:49:03.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 02:49:03.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 02:49:03.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 02:49:03.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 02:49:03.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 02:49:03.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 02:49:03.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 02:49:04.911  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 02:49:04.914  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 02:49:04.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 02:49:04.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 02:49:04.924  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 02:49:04.925  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 02:49:04.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 02:49:04.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 02:49:04.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 02:49:04.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 02:49:04.946 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 02:49:04.946 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 02:49:04.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 02:49:04.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 02:49:04.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 02:49:04.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 02:49:05.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: b5ff6fd18e652278a272a40d5d71e64a75ac81eeb109706063530c84e47d3ab8e87a3be6a8a1ea35760b4c78f8fb9df2ff5aae804b3142b773e338feec1a2bf756f4486659223bd2b25653bc52235004050a54a2321823d41ae7c6696cdd62587d4a833584dc722ba5888b35a48982eaea47e8c1634cdb811fe2f2ea41229bce8b1e25be187eb4c9f432b887b0ed134bcfb006b2f8a287ffb6ddb6201417e92e01d8e12e8a3b2350e93e60451df1f0f8a714ccbeb5579076cdf148be12a9867f1b04734682d12f9b066ba59763c9d05c786e4764b0d80eb32ac46de0f6d4e75febae93c80878816d9ce2cb2e23c526032bbb067bf7d92250b1d4601d4c1b2c07785790566957fca83254deae336c45ba924e9ce1d93134e56887b8e502b149a730cdf8279e60cde3dac7c6b986727bb19b0eac7f92c713c09e939f7b83d1c87eb28493037a8547e5f4533eaf5422aebfad9d5193481c9802902f1d2482ee040b79037b58356160c706f1eb1f5f01b46a4be5f16a014a10f9d85e24bf148770ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:29:7d:4b:cb:1a:27:99:3d:c7:a2:2f:77:cd:7f:a8:24:da:9e:95]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:41:12.804  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:41:12.806 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:41:12.808 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-17 04:41:12.809 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:41:12.811  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-17 04:41:12.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:41:12.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:41:12.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:41:12.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:41:12.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:41:12.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:41:12.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:41:12.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:41:12.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:41:13.035  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:41:13.036  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:41:13.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:41:13.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:41:13.040  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:41:13.040  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:41:13.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:41:13.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:41:13.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:41:13.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:41:13.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:41:13.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:41:13.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:41:13.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:41:13.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:41:13.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:41:13.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: b5ff6fd18e652278a272a40d5d71e64a75ac81eeb109706063530c84e47d3ab8e87a3be6a8a1ea35760b4c78f8fb9df2ff5aae804b3142b773e338feec1a2bf756f4486659223bd2b25653bc52235004050a54a2321823d41ae7c6696cdd62587d4a833584dc722ba5888b35a48982eaea47e8c1634cdb811fe2f2ea41229bce8b1e25be187eb4c9f432b887b0ed134bcfb006b2f8a287ffb6ddb6201417e92e01d8e12e8a3b2350e93e60451df1f0f8a714ccbeb5579076cdf148be12a9867f1b04734682d12f9b066ba59763c9d05c786e4764b0d80eb32ac46de0f6d4e75febae93c80878816d9ce2cb2e23c526032bbb067bf7d92250b1d4601d4c1b2c07785790566957fca83254deae336c45ba924e9ce1d93134e56887b8e502b149a730cdf8279e60cde3dac7c6b986727bb19b0eac7f92c713c09e939f7b83d1c87eb28493037a8547e5f4533eaf5422aebfad9d5193481c9802902f1d2482ee040b79037b58356160c706f1eb1f5f01b46a4be5f16a014a10f9d85e24bf148770ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:42:5f:de:53:8c:7f:69:94:be:ba:55:7b:9e:29:e3:f9:cc:cb:b0]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:43:02.678  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:43:02.679 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:43:02.680 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 04:43:02.681 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:43:02.681  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 04:43:02.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:43:02.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:43:02.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:43:02.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:43:02.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:43:02.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:43:02.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:43:02.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:43:02.692 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:43:02.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:43:02.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:43:02.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:43:02.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:43:02.837  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:43:02.838  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:43:02.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:43:02.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:43:02.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:43:02.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:43:02.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:43:02.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:43:02.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:43:02.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:43:02.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:43:02.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:43:02.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:4d:5b:e0:10:4a:64:87:16:1a:d4:dd:bf:30:ca:06:dc:7a:ab:cf]
            modulus: b987c694737ff4c24d7715c28347f0b9de90f35b8e9a7d0bd0511b76efa67f3c0ce1e29dbf1bf35223c986ef9ae0d5105c0df1047d6c6d46d39532f0d903eb9575e8c2bb84d2a9e3065633e085f297e64cc724fdd4b63da7134663489775e03cd24c270df7568a134b360d8f939187186081dbafcd7e09378c000a82009897d190eaf7e383baa9614bd1715499cf51ebd5350a4c62a3353b9dc3946718ebb7d8b206b645dc7c011574a863d4aa2a2c99fadb69d8cb23d30817206ebc5c419fbb87d80fe7734b6a70a5defbb5c792fb094ad4999944a853bbcb483ee061815f143dae55b92d772dc58f165a6c83f4bdfbf7f0165fe03f92e4bf1bb955c9ea2e67
    public exponent: 10001

] 
2021-11-17 04:46:17.838  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:46:17.840 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:46:17.841 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 04:46:17.841 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:46:17.842  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 04:46:17.843  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:46:17.843  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:46:17.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:46:17.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:46:17.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:46:17.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:46:17.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:46:17.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:46:17.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:46:18.022  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:46:18.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:46:18.023 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:46:18.023 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:46:18.036  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:46:18.037  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:46:18.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:18.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:18.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:18.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:18.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:18.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:18.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:18.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:18.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:18.041 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:46:18.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:a5:b3:24:e5:94:aa:95:e7:9c:f9:a4:c9:2a:b3:2a:89:c3:65:6b]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:46:20.111  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:46:20.112 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:46:20.113 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 04:46:20.114 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:46:20.115  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 04:46:20.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:46:20.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:46:20.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:46:20.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:46:20.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:46:20.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:46:20.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:46:20.142 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:46:20.142 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:46:20.237  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:46:20.238  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:46:20.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:46:20.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:46:20.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:46:20.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:46:20.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:20.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:20.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:20.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:20.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:20.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:20.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:20.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:20.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:20.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:46:20.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:d1:cc:5a:69:3c:91:94:ba:0b:62:e3:05:4a:60:e1:5b:95:61:bd]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:46:52.771  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:46:52.772 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:46:52.774 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-17 04:46:52.774 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:46:52.775  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-17 04:46:52.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:46:52.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:46:52.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:46:52.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:46:52.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:46:52.781 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:46:52.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:46:52.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:46:52.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:46:52.864  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:46:52.864  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:46:52.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:46:52.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:46:52.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:46:52.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:46:52.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:52.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:52.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:52.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:52.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:52.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:52.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:46:52.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:46:52.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:46:52.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:46:52.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:f7:2b:36:96:40:ae:ae:73:f5:8d:f5:97:c2:b7:3d:93:45:6a:1f]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:47:26.866  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:47:26.867 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:47:26.869 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-17 04:47:26.869 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:47:26.869  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-17 04:47:26.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:47:26.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:47:26.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:47:26.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:47:26.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:47:26.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:47:26.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:47:26.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:47:26.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:47:26.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:47:26.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:47:26.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:47:26.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:47:26.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:47:26.966  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:47:26.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:47:26.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:47:26.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:47:26.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:47:26.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:47:26.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:47:26.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:47:26.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:47:26.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:47:26.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:47:27.038 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:44:9a:0c:ef:9e:fd:a8:30:4d:b7:a6:ed:dc:bb:da:fd:92:2c:6c]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:48:49.323  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:48:49.324 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:48:49.325 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-17 04:48:49.326 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:48:49.326  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-17 04:48:49.327  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:48:49.327  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:48:49.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:48:49.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:48:49.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:48:49.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:48:49.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:48:49.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:48:49.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:48:49.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:48:49.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:48:49.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:48:49.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:48:49.416  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:48:49.416  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:48:49.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:48:49.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:48:49.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:48:49.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:48:49.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:48:49.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:48:49.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:48:49.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:48:49.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:48:49.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:48:49.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:79:18:25:e7:57:29:1e:36:fb:dc:40:a7:c3:91:81:c9:5c:f6:85]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 04:49:32.827  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 04:49:32.828 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 04:49:32.829 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 04:49:32.829 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 04:49:32.830  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 04:49:32.830  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 04:49:32.830  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 04:49:32.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 04:49:32.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 04:49:32.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 04:49:32.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 04:49:32.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:49:32.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 04:49:32.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:49:32.924  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 04:49:32.925  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 04:49:32.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 04:49:32.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 04:49:32.936  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 04:49:32.936  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 04:49:32.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:49:32.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:49:32.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:49:32.938 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:49:32.938 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:49:32.938 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:49:32.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 04:49:32.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 04:49:32.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 04:49:32.940 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 04:49:32.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561952598139249248188991964877895606512809177883
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 02:42:18 UTC 2021
           Final Date: Mon Nov 17 02:42:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:30:80:95:b6:d7:b3:bd:c3:a4:77:40:3b:d7:f6:85:43:98:25:f9]
            modulus: b5ff6fd18e652278a272a40d5d71e64a75ac81eeb109706063530c84e47d3ab8e87a3be6a8a1ea35760b4c78f8fb9df2ff5aae804b3142b773e338feec1a2bf756f4486659223bd2b25653bc52235004050a54a2321823d41ae7c6696cdd62587d4a833584dc722ba5888b35a48982eaea47e8c1634cdb811fe2f2ea41229bce8b1e25be187eb4c9f432b887b0ed134bcfb006b2f8a287ffb6ddb6201417e92e01d8e12e8a3b2350e93e60451df1f0f8a714ccbeb5579076cdf148be12a9867f1b04734682d12f9b066ba59763c9d05c786e4764b0d80eb32ac46de0f6d4e75febae93c80878816d9ce2cb2e23c526032bbb067bf7d92250b1d4601d4c1b2c07785790566957fca83254deae336c45ba924e9ce1d93134e56887b8e502b149a730cdf8279e60cde3dac7c6b986727bb19b0eac7f92c713c09e939f7b83d1c87eb28493037a8547e5f4533eaf5422aebfad9d5193481c9802902f1d2482ee040b79037b58356160c706f1eb1f5f01b46a4be5f16a014a10f9d85e24bf148770ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae2e851fbdc795ab235d8e5f01f26cb3c75f2dc5
                       12e9dda9b487e27b99bb794c00ecf4b207cbe5c4
                       bfe048ca2427fb547b4720fb7a70d7f19776d479
                       8df4a5db8d197e89729770ce2039b33f5002c794
                       b4c2da42a5633a2ce9ed5d3b599803c2cfc45580
                       5b342f2d3aa3eec380a22986d61d795e10565ea7
                       64c12e86158e787e7cdc5b7c930176779408442a
                       bdbc8fd51d84eeaf34f232d50c557b34bd1b0d76
                       63d354b8a868e43c2b9e4d6c68d54a957c5b5fd0
                       7a4c74238e14bcf5a34bab10914f7a7e9ca0c4b4
                       c08388ca5e74cef553df025fe3ea9142ec2fe799
                       fe209c11a8b077e83b371a9a38a241615f2fae67
                       98e44904e267fc73241a959377b8e66cad1b702e
                       76d23bc1b97b2a3ce1190116ebfc447ff74136c2
                       3240d6570fa0d4f2539f4da006656174ea6f4717
                       be11897193f12faaeba3895b8d6406ada2270edb
                       db66dc1fbc460443e91907ff805c7d115ff7c0d5
                       6b12901bfd88ee8719dbd8a5e905491c99c1a871
                       9d2d1892ebe96de7e532bf597619c9ba533420f8
                       3c1a8129
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:85:5b:4f:00:8c:37:44:cd:9a:d9:85:11:77:20:59:a0:2a:8a:e0]
            modulus: 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
    public exponent: 10001

]