Results

By type

          2022-03-14 02:44:53,662 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-14 02:44:57,373 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-14 02:44:59.561  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 14, 2022 2:45:07 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 14, 2022 2:45:07 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 14, 2022 2:45:07 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 14, 2022 2:45:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-14 02:45:09.661 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-14 02:45:10.666  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-14 02:45:11.274  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-14 02:45:13.968 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-14 02:45:13.971 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-14 02:45:13.972 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-14 02:45:13.975 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-14 02:45:14.166 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-14 02:45:14.168 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-14 02:45:14.570 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-14 02:45:18.370 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 14, 2022 2:45:21 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-14 02:45:22.081  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.417 seconds (JVM running for 37.457)
Mar 14, 2022 2:45:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-14 02:45:56.565  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 02:45:56.571 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 02:45:56.672 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-14 02:45:56.677 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 02:45:56.761  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-14 02:45:56.763  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 02:45:56.764  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 02:45:56.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 02:45:56.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 02:45:56.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 02:45:56.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 02:45:56.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 02:45:56.880 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 02:45:56.884 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 02:45:56.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 02:45:56.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 02:45:57.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 02:45:57.962  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 02:45:57.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 02:45:57.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 02:45:57.971  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 02:45:57.972  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 02:45:57.972 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 02:45:57.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 02:45:57.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 02:45:58.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 02:45:58.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 02:45:58.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 02:45:58.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 02:45:58.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 02:45:58.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 02:45:58.072 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 02:45:58.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:26:3e:cd:d5:91:04:a6:0f:7e:c4:de:6c:c3:16:af:58:1c:c2:53]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:25:18.755  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:25:18.756 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:25:18.758 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-14 04:25:18.758 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:25:18.759  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-14 04:25:18.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:25:18.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:25:18.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:25:18.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:25:18.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:25:18.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:25:18.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:25:18.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:25:18.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:25:18.972  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:25:18.972  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:25:18.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:25:18.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:25:18.975  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:25:18.975  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:25:18.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:25:18.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:25:18.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:25:18.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:25:18.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:25:18.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:25:18.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:25:18.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:25:18.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:25:18.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:25:18.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: b8d3114f20b95491fde766c395efe43dc5841e811fe446eaa47cb22bc68bec25f0491010f54b775323c552c486e2745370781e67e7d705b3d2dfbf575fb7eb4b8f29ce6c09c8a352ff11280f49140d4582e4e178d5c2d0675d694ea1fff6bdfc4d9bdd02039cab81fee7c0f42ab3be08e67587df7278c538d6e708cde11b13d22bd3c977a6d5020467dc357fda98b25139485201e6bfba6addad24d0ba3d1ec34df05cdc09ac940b5b9131f57d3ac501bcf634dbe53a14f43f09b8a1f46987188e77f3b9b0579aaf07355206b8cd5f671386c30dcbafdb6dc41891f54de23d82e88100b59c3ab7f01efae24acae58e1f68aa59d07e017f05ab524490abea0a52d8f7f9803aaea886e889a3865903b514f2eff43295aec9af02e1b3959075dca113b7e8cd77af372e0046ac4cee0b5626f4c4df3b1e0109c675bb5d63a4677d5082681e546fc47c91bbb2bcf3ad376f146ba2ccd8e9fedc9e286693a58e029423ee74b6e489cfd9130fd8d043ab9f76ee984a3ab3e1f61688b62124821ff40b61
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:a5:61:b4:ec:13:38:3f:9f:cf:5e:34:74:9e:93:4f:df:72:a0:16]
            modulus: cd4bc9d78f0840261c27fb15c03e09be4f24ac6fcfe388d73929aa512122473488d83d6141ffc1c3a77dd83f8d2261a367d31791875471d4b86c6916daf9b602e4163d9a6ce94223109ce314327018ff1b07ff2249333e73ff37199f17194d63cc416837b460e092e35140b47e9edba065b5be009dc402a6a756d183de0520f7f96ecfd1b4f5030c7c0bd75db24cbf4f464ef7043c7d40efd4493199b3e9db687559dce0f0b5e9dba73f7d2f449f072a649bad9f65b24345cce437d45f6b6023a03d7fd0f36dee780b234c70b9af5c0330b7130551e20003ebb8db0fa0d2ad7588d4d5009d65a316efe4464e5b2a3e1ee64ce52947e0ad50ce3454536b68e273
    public exponent: 10001

] 
2022-03-14 04:29:35.274  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:29:35.275 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:29:35.276 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-14 04:29:35.277 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:29:35.278  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-14 04:29:35.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:29:35.279  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:29:35.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:29:35.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:29:35.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:29:35.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:29:35.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:29:35.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:29:35.291 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:29:35.453  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:29:35.454  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:29:35.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:29:35.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:29:35.460  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:29:35.460  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:29:35.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:29:35.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:29:35.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:29:35.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:29:35.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:29:35.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:29:35.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:29:35.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:29:35.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:29:35.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:29:35.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:5d:32:0d:02:5d:8e:ee:e3:12:be:39:0f:67:a4:6e:7f:bf:c9:f2]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:30:07.362  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:30:07.363 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:30:07.364 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-14 04:30:07.364 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:30:07.365  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-14 04:30:07.365  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:30:07.365  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:30:07.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:30:07.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:30:07.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:30:07.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:30:07.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:30:07.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:30:07.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:30:07.450  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:30:07.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:30:07.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:30:07.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:30:07.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:30:07.459  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:30:07.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:30:07.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:30:07.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:30:07.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:30:07.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:30:07.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:30:07.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:30:07.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:30:07.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:30:07.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:30:07.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:98:59:1e:a7:ac:db:f8:73:c4:0a:6d:07:fb:ab:a9:5f:c2:e0:dd]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:30:40.262  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:30:40.263 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:30:40.265 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-14 04:30:40.265 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:30:40.266  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-14 04:30:40.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:30:40.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:30:40.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:30:40.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:30:40.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:30:40.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:30:40.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:30:40.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:30:40.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:30:40.351  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:30:40.352  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:30:40.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:30:40.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:30:40.359  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:30:40.360  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:30:40.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:30:40.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:30:40.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:30:40.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:30:40.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:30:40.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:30:40.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:30:40.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:30:40.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:30:40.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:30:40.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:25:eb:23:f2:90:ac:8e:cb:1e:74:c5:f6:c3:86:67:7e:86:0c:51]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:32:45.470  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:32:45.472 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:32:45.473 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-14 04:32:45.473 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:32:45.473  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-14 04:32:45.474  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:32:45.474  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:32:45.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:32:45.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:32:45.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:32:45.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:32:45.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:32:45.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:32:45.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:32:45.554  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:32:45.554  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:32:45.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:32:45.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:32:45.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:32:45.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:32:45.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:32:45.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:32:45.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:32:45.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:32:45.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:32:45.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:32:45.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:32:45.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:32:45.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:32:45.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:32:45.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:64:e5:35:03:ab:76:33:85:45:86:8a:0e:42:4d:60:4c:73:97:c4]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:45:52.495  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:45:52.496 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:45:52.497 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-14 04:45:52.497 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:45:52.498  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-14 04:45:52.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:45:52.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:45:52.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:45:52.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:45:52.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:45:52.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:45:52.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:45:52.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:45:52.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:45:52.586  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:45:52.586  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:45:52.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:45:52.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:45:52.587  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:45:52.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:45:52.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:45:52.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:45:52.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:45:52.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:45:52.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:45:52.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:45:52.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:45:52.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:45:52.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:45:52.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:45:52.593 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:a5:b5:ed:e8:21:ab:11:23:86:9c:7c:b4:df:48:bb:0b:9c:57:93]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:47:04.938  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:47:04.939 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:47:04.940 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-14 04:47:04.941 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:47:04.941  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-14 04:47:04.941  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:47:04.942  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:47:04.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:47:04.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:47:04.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:47:04.946 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:47:04.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:47:04.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:47:04.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:47:05.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:47:05.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:47:05.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:47:05.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:47:05.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:47:05.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:47:05.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:47:05.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:47:05.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:47:05.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:47:05.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:47:05.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:47:05.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:47:05.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:47:05.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:47:05.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:47:05.065 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:ce:3b:ce:59:12:90:ed:7e:dd:27:4b:c0:22:07:ad:6f:d3:fb:21]
            modulus: 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
    public exponent: 10001

] 
2022-03-14 04:48:36.922  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-14 04:48:36.923 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-14 04:48:36.924 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-14 04:48:36.924 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-14 04:48:36.924  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-14 04:48:36.925  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-14 04:48:36.925  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-14 04:48:36.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-14 04:48:36.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-14 04:48:36.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-14 04:48:36.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-14 04:48:36.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:48:36.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-14 04:48:36.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:48:37.059  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-14 04:48:37.059  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-14 04:48:37.060 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-14 04:48:37.060 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-14 04:48:37.061  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-14 04:48:37.061  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-14 04:48:37.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:48:37.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:48:37.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:48:37.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:48:37.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:48:37.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:48:37.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-14 04:48:37.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-14 04:48:37.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-14 04:48:37.064 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-14 04:48:37.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 598128717490802338174607432566200878054319817026
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Mar 14 02:41:06 UTC 2022
           Final Date: Sat Mar 13 02:41:05 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c]
            modulus: b8d3114f20b95491fde766c395efe43dc5841e811fe446eaa47cb22bc68bec25f0491010f54b775323c552c486e2745370781e67e7d705b3d2dfbf575fb7eb4b8f29ce6c09c8a352ff11280f49140d4582e4e178d5c2d0675d694ea1fff6bdfc4d9bdd02039cab81fee7c0f42ab3be08e67587df7278c538d6e708cde11b13d22bd3c977a6d5020467dc357fda98b25139485201e6bfba6addad24d0ba3d1ec34df05cdc09ac940b5b9131f57d3ac501bcf634dbe53a14f43f09b8a1f46987188e77f3b9b0579aaf07355206b8cd5f671386c30dcbafdb6dc41891f54de23d82e88100b59c3ab7f01efae24acae58e1f68aa59d07e017f05ab524490abea0a52d8f7f9803aaea886e889a3865903b514f2eff43295aec9af02e1b3959075dca113b7e8cd77af372e0046ac4cee0b5626f4c4df3b1e0109c675bb5d63a4677d5082681e546fc47c91bbb2bcf3ad376f146ba2ccd8e9fedc9e286693a58e029423ee74b6e489cfd9130fd8d043ab9f76ee984a3ab3e1f61688b62124821ff40b61
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 07a424368669653e92d5097e48e70e76bed566bb
                       3514c83b9303c74327ff080a0c8dc51ddf0daa63
                       c2f75a01fda697a1637ee0e13bd59a00e6646aa7
                       a7b56e20564df51a00af781bed17e3c74e4aaef1
                       66a4d57a01e757d21c296189204201d8a6091703
                       8529023bb45fc52df06e2e38fad24b07d7b035f4
                       479b0a6961bf23a42a4bbdf2ae554269e1af84d5
                       8b5567cc665844337a203b8b6c7cc7281470d532
                       55056830beb0074d54b3fe3480ced4b178673ec1
                       844a9ba9b05354cfe45a573d66df77b4a9152c60
                       e8cb9cbd6b76c601d7647f67db7d2568d6a3036a
                       765da1916e9930c39a0517b9769a8314c1e65033
                       0b13a062f42c4b66e3353926960446dfbc4e3e15
                       934da5b99e37efb07dcd21361d39e93708f9eb96
                       82c2ffc34051ea109537acac70c355049770c63c
                       cf90e97019c3e1f93426d165a7b6d7cb848abb03
                       3e7f6db25f491c7215e5aae219c4ff3077b8d705
                       00576d91097847d671b623e3af4b83a7f6b3c3c4
                       5e6b4493b004d016dc352c7698ecd5176c637b82
                       c1349d2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:d8:5a:9d:16:b9:da:14:96:2b:bb:4c:1a:2a:74:5c:09:79:22:7b]
            modulus: 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
    public exponent: 10001

]