Results

By type

          2022-03-04 03:07:07,576 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-04 03:07:12,357 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-04 03:07:15.069  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 04, 2022 3:07:24 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 04, 2022 3:07:24 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 04, 2022 3:07:24 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 04, 2022 3:07:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-04 03:07:26.471 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-04 03:07:27.665  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-04 03:07:28.282  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-04 03:07:30.980 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-04 03:07:31.057 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-04 03:07:31.059 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-04 03:07:31.062 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-04 03:07:31.261 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-04 03:07:31.264 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-04 03:07:31.781 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-04 03:07:35.659 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 04, 2022 3:07:39 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-04 03:07:40.659  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 36.117 seconds (JVM running for 43.464)
Mar 04, 2022 3:07:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-04 03:08:07.871  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 03:08:07.876 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 03:08:08.060 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-04 03:08:08.064 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 03:08:08.159  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-04 03:08:08.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 03:08:08.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 03:08:08.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 03:08:08.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 03:08:08.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 03:08:08.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 03:08:08.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 03:08:08.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 03:08:08.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 03:08:08.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 03:08:08.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 03:08:09.722  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 03:08:09.724  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 03:08:09.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 03:08:09.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 03:08:09.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 03:08:09.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 03:08:09.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 03:08:09.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 03:08:09.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 03:08:09.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 03:08:09.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 03:08:09.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 03:08:09.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 03:08:09.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 03:08:09.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 03:08:09.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 03:08:09.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:a6:bd:70:43:69:61:41:ac:b1:85:a4:41:e9:7e:ef:3f:b2:76:b0]
            modulus: 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
    public exponent: 10001

] 
2022-03-04 10:02:09.485  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:02:09.487 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:02:09.489 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-04 10:02:09.491 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:02:09.492  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-04 10:02:09.493  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:02:09.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:02:09.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:02:09.558 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:02:09.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:02:09.663 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:02:09.664 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:02:09.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:02:09.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:02:09.889  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:02:09.889  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:02:09.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:02:09.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:02:09.962  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:02:09.962  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:02:09.963 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:02:09.963 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:02:09.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:02:09.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:02:09.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:02:09.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:02:10.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:02:10.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:02:10.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:02:10.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:02:10.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:40:8a:93:0e:11:91:ef:49:05:f7:5d:cd:9a:bf:eb:0c:27:d4:90]
            modulus: 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
    public exponent: 10001

] 
2022-03-04 10:06:58.723  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:06:58.725 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:06:58.727 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-04 10:06:58.728 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:06:58.728  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-04 10:06:58.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:06:58.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:06:58.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:06:58.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:06:58.731 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:06:58.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:06:58.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:06:58.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:06:58.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:06:58.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:06:58.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:06:58.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:06:58.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:06:58.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:06:58.886  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:06:58.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:06:58.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:06:58.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:06:58.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:06:58.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:06:58.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:06:58.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:06:58.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:06:58.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:06:58.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:06:58.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:14:11:3f:fc:77:8c:db:11:16:fa:e3:d7:41:09:9a:a7:d5:2e:ae]
            modulus: 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
    public exponent: 10001

] 
2022-03-04 10:07:31.657  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:07:31.658 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:07:31.659 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-04 10:07:31.660 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:07:31.660  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-04 10:07:31.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:07:31.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:07:31.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:07:31.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:07:31.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:07:31.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:07:31.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:07:31.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:07:31.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:07:31.775  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:07:31.776  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:07:31.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:07:31.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:07:31.778  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:07:31.778  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:07:31.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:07:31.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:07:31.780 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:07:31.780 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:07:31.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:07:31.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:07:31.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:07:31.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:07:31.783 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:07:31.783 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:07:31.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:f8:17:12:f3:e5:b9:e1:00:d4:6e:d0:32:fd:36:7c:ed:db:52:3e]
            modulus: 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
    public exponent: 10001

] 
2022-03-04 10:08:04.425  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:08:04.426 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:08:04.427 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-04 10:08:04.428 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:08:04.428  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-04 10:08:04.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:08:04.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:08:04.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:08:04.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:08:04.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:08:04.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:08:04.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:08:04.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:08:04.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:08:04.554  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:08:04.557  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:08:04.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:08:04.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:08:04.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:08:04.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:08:04.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:08:04.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:08:04.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:08:04.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:08:04.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:08:04.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:08:04.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:08:04.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:08:04.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:08:04.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:08:04.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:87:67:63:2b:72:a4:6e:c8:7e:24:4a:df:5f:93:48:cb:90:aa:32]
            modulus: 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
    public exponent: 10001

] 
2022-03-04 10:10:31.125  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:10:31.127 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:10:31.128 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-04 10:10:31.128 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:10:31.129  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-04 10:10:31.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:10:31.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:10:31.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:10:31.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:10:31.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:10:31.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:10:31.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:10:31.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:10:31.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:10:31.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:10:31.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:10:31.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:10:31.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:10:31.249  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:10:31.250  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:10:31.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:10:31.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:10:31.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:10:31.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:10:31.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:10:31.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:10:31.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:10:31.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:10:31.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:10:31.258 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:10:31.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: e37b3d31414e80f9887b85aafe463b29cb21f7d41d2bcca60e2615654f165e3f70215382ead3484008b6ab3a069b77c9f045a7588f067236233e8db06387afde7d0b472ac3c875f584978f8a8e2d8b7a678d21290b9e55ffee7c8780576d591be5304b36ed0e1be1febb8600fc43264dc4bc1b1f460ba116503cffd124ace0818a433391808b0cfd14eb20bebbf15eb4c7ebf707b8d86d8939329b944e65c4140413ccde22a9a8948a9c43cc051bba47fca9e5761404c64b331f92088922dd8ec583ce235a911b2ce468c0b873905fde915b898277a7cf54607031f40a35c1940e2b3b03305b9affd72b2b8a48b67b9cb23ebddeee47fa8bf23d4665877ca8d418a1eded6e3ce876dd44b00d3cda65764db36223c6e8416edef474efb726c6ba3a11fead1c33e8a18c4118a94228a56acf4d48e5402058b215d47db214c7f0f2071ef86874ffdc1df3be4150e2704a834e74d58b1076d3152f049bb69feef4874dcadb169ffd40ebebea95227d7cb668fc15f3110385b37cf60c1ba44a760701
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:f8:22:d7:03:f9:b1:8a:1e:3a:01:8e:e5:71:5d:b9:24:cc:5e:50]
            modulus: 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
    public exponent: 10001

] 
2022-03-04 10:26:36.893  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:26:36.894 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:26:36.896 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-04 10:26:36.897 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:26:36.897  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-04 10:26:36.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:26:36.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:26:36.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:26:36.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:26:36.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:26:36.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:26:36.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:26:36.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:26:36.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:26:37.054  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:26:37.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:26:37.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:26:37.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:26:37.060  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:26:37.060  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:26:37.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:26:37.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:26:37.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:26:37.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:26:37.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:26:37.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:26:37.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:26:37.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:26:37.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:26:37.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:26:37.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:9b:fb:10:0e:44:d9:2d:ae:b7:f7:c3:77:bc:90:40:ad:21:63:61]
            modulus: dfa9bac4e3d7c2cd7304561f6cfff0a3a1d0773975db7943382667c6f73201966ce698c9a643e27ad8addb76a3e1979e20d065eb45b1c47455df71dfd54f6420daea6884e37c2448120f9b2dfadc7fd94dcd2a4be3401624f393d2382f2339973b07c0203691fd03fd7ee914f8d389f11aba35642d2a1d058d3693d9b11807bee43b343edcda0ed84b87865bb09ad2371bb8789275c9024ffcfd81634daa66ac5edceef11cbdab86fb6f2d20a250299a41a70adb28bfb07eebf6a0ee4002e73a42e764b2cc31a733fe6adb7cbcb5551d6a319f022adba1cab8fc2c3a52be448e6ad7326635036bd629b2001f93493b69d5fc5f230f856225af7327352e0d12e7
    public exponent: 10001

] 
2022-03-04 10:27:51.442  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:27:51.443 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:27:51.444 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-04 10:27:51.444 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:27:51.445  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-04 10:27:51.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:27:51.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:27:51.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:27:51.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:27:51.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:27:51.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:27:51.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:27:51.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:27:51.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:27:51.557  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:27:51.558  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:27:51.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:27:51.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:27:51.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:27:51.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:27:51.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:27:51.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:27:51.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:27:51.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:27:51.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:27:51.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:27:51.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:27:51.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:27:51.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:27:51.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:27:51.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:d8:44:87:ec:cd:37:33:f1:51:9b:95:2a:76:1c:84:b0:95:8d:5a]
            modulus: d6a295ab3ff9733408b5bca83f4f4f27b71737180dd4623cd83e6f9d7fce0035885a8103cccb02b624a3ea66e2d486c7d5605e5b04fb9cb7550713f56fc6a8b55edf7b433eb2a9073aae3cef0fcb1b6e9e9f8586a2a09a50c0696ecb20ae9bb0a42a8791743e54f6f5791672b4ad24d2742785b252ab946a1ead8713d160e6f02ee37aa31e1d7c8144ba519d54d393465b0a3c184f81b5fc27fdfc717791ed8b52d5464c27dd61307c3a611a9ae6e0edc2806cf460f7aa8736b17770cb37c10c8ffdd5d83c531dfda97b2de0d727e4e66d708a377e37a3018ea1b4ad414230205042c9e6dd9d7eeb706d1e52e07b59bb61637570d90de4f071372a19694227a7
    public exponent: 10001

] 
2022-03-04 10:30:03.859  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-04 10:30:03.860 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-04 10:30:03.861 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-04 10:30:03.862 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-04 10:30:03.862  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-04 10:30:03.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-04 10:30:03.863  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-04 10:30:03.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-04 10:30:03.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-04 10:30:03.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-04 10:30:03.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-04 10:30:03.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:30:03.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-04 10:30:03.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:30:03.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-04 10:30:03.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-04 10:30:03.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-04 10:30:03.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-04 10:30:03.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-04 10:30:03.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-04 10:30:03.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:30:03.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:30:03.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:30:03.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:30:03.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:30:03.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:30:03.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-04 10:30:03.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-04 10:30:03.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-04 10:30:03.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-04 10:30:03.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 526288956448708683927728464616571276524461799590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 04 03:03:25 UTC 2022
           Final Date: Wed Mar 03 03:03:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:14:99:b2:20:4f:04:d7:b0:c7:ee:e2:8b:0d:8b:bd:12:90:00:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbaa14a8d50fecef19ded52888afebfc80e48d89
                       3badbbd29c3cb51cb35402f62d020cdc86514ad0
                       ab1d0c3ed2a464ad9f4fcdcc20c6c592bc7e7a16
                       73f9fe268dc2bb34940b72342a1a2b2a4806e6c3
                       a02f7946efcf15019b9cf1336ff13d5f96eb2425
                       1f2b2affe6708998cb1114083485605f9476061b
                       a4f9694b0fe590ff00b60e33bb25239889758725
                       b2547049826d310ad351ca5261d8e1dcafe0c1af
                       95c79de111e3ff91e2f4d3f5b73fb813aec8ec4b
                       945657d4e463018de1118abcf3cbdf9b86cfe388
                       bddeab6e19ee56cf1aedcf5b23f888ff16572ee8
                       9f54220b6f4682e9253b3e759eaad32fc46e41b2
                       d2d2081ee5c8392acfbc3be58343be69c10a0f93
                       48ca4a854671ed5b83cb06ceebc7b30fde008454
                       34c984eaa295e63f4ac590068e5e491e4f737a06
                       14c41e3c48dca6a7a036cc5cdd535506dc52a01c
                       1db484944b5c30baa538ac9435bc28d385aef346
                       fbb722f6b3dd013a6d736650f28f369ede3a4380
                       adf08f1b92b64696c46dfef6684a982e4444ee69
                       a5698e84
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:38:4e:55:45:af:02:c6:a0:f1:c2:c5:1e:4b:61:28:49:3d:40:24]
            modulus: bc382bee548004c3227ea5274a45c0103062b738341ba975c9cf4a2ce78c9eba58f8377873a9ae37041cb5ec20409dd7693d3fad4cfd26664144e3281c7468bcca62dae1d4586bdfa517f197e394318a536f2d01321aa8cb5e4a55afd163b4983f8e443e9a36ab636ce0f6f59216df6e23f196018c653b88cb6df13595a5c72c9333ecb78f9b5706647c4ada62216d39cdb7156fc69eba6d0efffb00c8b87b4791c006530a3c6e168a9736490849b30f281a0771f56ac784cae6e7aab5c7ce373235d8da6013d1d3451dc7b89ca7a5d1a3f647464edc0989d8bc14b878956bad295bcba04996c62fd49c55639fb117ae0b4628aee7080f09359b74df09a5e6af
    public exponent: 10001

]