Results

By type

          2022-03-23 02:09:01,399 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-23 02:09:05,106 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-23 02:09:07.795  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 23, 2022 2:09:16 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 23, 2022 2:09:16 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 23, 2022 2:09:16 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 23, 2022 2:09:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-23 02:09:17.903 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-23 02:09:18.909  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-23 02:09:19.600  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-23 02:09:22.309 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-23 02:09:22.312 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-23 02:09:22.313 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-23 02:09:22.396 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-23 02:09:22.508 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-23 02:09:22.511 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-23 02:09:22.913 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-23 02:09:27.409 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 23, 2022 2:09:30 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-23 02:09:31.105  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.592 seconds (JVM running for 39.156)
Mar 23, 2022 2:09:32 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-23 02:10:27.608  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 02:10:27.616 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 02:10:27.715 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-23 02:10:27.719 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 02:10:27.794  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-23 02:10:27.796  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 02:10:27.797  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 02:10:27.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 02:10:27.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 02:10:27.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 02:10:27.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 02:10:27.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 02:10:27.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 02:10:28.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 02:10:28.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 02:10:28.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 02:10:29.310  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 02:10:29.312  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 02:10:29.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 02:10:29.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 02:10:29.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 02:10:29.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 02:10:29.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 02:10:29.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 02:10:29.324 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 02:10:29.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 02:10:29.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 02:10:29.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 02:10:29.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 02:10:29.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 02:10:29.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 02:10:29.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 02:10:29.517 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:35:21:92:86:bf:da:48:02:fd:f6:a0:47:86:7a:08:f9:b4:74:df]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 03:48:07.720  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 03:48:07.721 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 03:48:07.723 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-23 03:48:07.724 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 03:48:07.725  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-23 03:48:07.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 03:48:07.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 03:48:07.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 03:48:07.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 03:48:07.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 03:48:07.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 03:48:07.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:48:07.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:48:07.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:48:07.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 03:48:07.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 03:48:07.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 03:48:07.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:48:07.908  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 03:48:07.909  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 03:48:07.909 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:48:07.909 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:48:07.910 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:48:07.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:48:07.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:48:07.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:48:07.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:48:07.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:48:07.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:48:07.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 03:48:07.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:9a:a0:10:a8:d8:db:7a:0f:d0:10:70:63:1b:f3:6d:40:4c:58:d0]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 03:52:50.857  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 03:52:50.858 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 03:52:50.860 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-23 03:52:50.860 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 03:52:50.861  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-23 03:52:50.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 03:52:50.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 03:52:50.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 03:52:50.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 03:52:50.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 03:52:50.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 03:52:50.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:52:50.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:52:50.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:52:50.991  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 03:52:50.992  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 03:52:50.992 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 03:52:50.992 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:52:50.994  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 03:52:50.994  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 03:52:50.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:52:50.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:52:50.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:52:50.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:52:50.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:52:50.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:52:50.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:52:50.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:52:50.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:52:50.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 03:52:51.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:e6:07:9b:e4:30:9f:a3:54:18:34:45:d4:3e:89:31:09:ee:81:be]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 03:53:21.884  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 03:53:21.884 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 03:53:21.885 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-23 03:53:21.886 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 03:53:21.886  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-23 03:53:21.887  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 03:53:21.887  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 03:53:21.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 03:53:21.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 03:53:21.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 03:53:21.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 03:53:21.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:53:21.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:53:21.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:53:21.992  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 03:53:21.993  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 03:53:21.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 03:53:21.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:53:21.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 03:53:21.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 03:53:21.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:53:21.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:53:21.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:53:21.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:53:21.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:53:21.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:53:21.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:53:21.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:53:21.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:53:21.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 03:53:22.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:83:ab:db:9e:69:76:50:23:7a:b4:60:12:cb:9a:05:92:4b:a2:df]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 03:53:55.410  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 03:53:55.410 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 03:53:55.411 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-23 03:53:55.412 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 03:53:55.412  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-23 03:53:55.412  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 03:53:55.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 03:53:55.413 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 03:53:55.413 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 03:53:55.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 03:53:55.418 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 03:53:55.418 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:53:55.418 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:53:55.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:53:55.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 03:53:55.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 03:53:55.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 03:53:55.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:53:55.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 03:53:55.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 03:53:55.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:53:55.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:53:55.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:53:55.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:53:55.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:53:55.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:53:55.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:53:55.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:53:55.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:53:55.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 03:53:55.601 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:55:b6:40:79:6d:c5:d9:51:ef:af:e5:cb:94:5c:31:c8:1d:99:c6]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 03:56:23.238  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 03:56:23.239 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 03:56:23.240 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-23 03:56:23.240 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 03:56:23.240  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-23 03:56:23.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 03:56:23.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 03:56:23.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 03:56:23.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 03:56:23.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 03:56:23.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 03:56:23.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:56:23.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 03:56:23.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:56:23.343  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 03:56:23.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 03:56:23.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 03:56:23.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 03:56:23.345  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 03:56:23.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 03:56:23.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:56:23.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:56:23.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:56:23.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:56:23.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:56:23.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:56:23.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 03:56:23.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 03:56:23.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 03:56:23.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 03:56:23.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: ab9d99ea5c4f6af11f30551d82d7b4f8fa2bd7ede8c492bbee8897aa75cc2329147c4561e36a2ccc86ffa9164b38d979cb1e97549952fd2a5da515d94b2259dcc9a76eeb4fe7741547e81f9acf1278d715186d6a08f8f532f69fef1ce78c7821e3cc2a66b9d70523fc0d66650421c97ce3e8ca2569c800a99ff085276dcf986c0502933474ec6d37d4fe01b537f00a77252dbe888580fc55386e5b1b9982b2b1cac4c0bb9e1bc12585f88b3cae29f1d8f841072bae3f4c63accea96033063b4c6ce25892dfba4394027c3bb7fbbba7ab829501d1207130d2ccd9b25391e956c46d6a17573d24ace179fd4706fa1d131078879e829b57394ca50e9c5111fd27921b5473e13564b5c80e96a61a1ab0700025e5dd89934cdb651d49d73b677b8d96374e1917b17303f35b905d315e2c186c372b85e5a6c30f79d58768a06a1dcb956a0ed2400d0e273b4a8c67fa6c14a00f71440dcb420b7972386b2573aee84be7ff7d2c4b51f20c3b104e9a6d0c5043d5bb9f3e924d40321f17426023410c15b7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:ae:65:5e:56:06:05:b6:90:26:0a:10:81:16:38:05:d9:85:78:d9]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 04:16:09.901  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 04:16:09.903 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 04:16:09.904 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-23 04:16:09.905 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 04:16:09.905  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-23 04:16:09.905  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 04:16:09.906  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 04:16:09.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 04:16:09.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 04:16:09.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 04:16:09.911 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 04:16:09.911 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 04:16:09.911 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 04:16:09.911 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 04:16:10.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 04:16:10.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 04:16:10.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 04:16:10.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 04:16:10.023  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 04:16:10.024  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 04:16:10.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:16:10.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:16:10.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:16:10.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:16:10.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:16:10.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:16:10.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:16:10.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:16:10.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:16:10.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 04:16:10.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:8e:b4:90:0d:02:35:0a:b4:f0:09:65:ce:a8:c2:3a:97:87:a5:e1]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 04:17:24.595  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 04:17:24.597 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 04:17:24.598 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-23 04:17:24.598 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 04:17:24.599  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-23 04:17:24.599  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 04:17:24.600  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 04:17:24.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 04:17:24.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 04:17:24.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 04:17:24.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 04:17:24.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 04:17:24.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 04:17:24.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 04:17:24.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 04:17:24.717  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 04:17:24.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 04:17:24.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 04:17:24.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 04:17:24.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 04:17:24.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:17:24.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:17:24.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:17:24.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:17:24.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:17:24.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:17:24.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:17:24.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:17:24.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:17:24.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 04:17:24.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:f4:f0:44:60:54:39:e8:15:a2:84:05:fc:cc:be:aa:6d:21:2f:c2]
            modulus: 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
    public exponent: 10001

] 
2022-03-23 04:19:36.531  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-23 04:19:36.532 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-23 04:19:36.534 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-23 04:19:36.534 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-23 04:19:36.535  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-23 04:19:36.535  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-23 04:19:36.535  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-23 04:19:36.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-23 04:19:36.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-23 04:19:36.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-23 04:19:36.543 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-23 04:19:36.544 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 04:19:36.544 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-23 04:19:36.544 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 04:19:36.640  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-23 04:19:36.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-23 04:19:36.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-23 04:19:36.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-23 04:19:36.642  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-23 04:19:36.643  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-23 04:19:36.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:19:36.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:19:36.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:19:36.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:19:36.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:19:36.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:19:36.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-23 04:19:36.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-23 04:19:36.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-23 04:19:36.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-23 04:19:36.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 528327535176765128660350932468645266091506669680
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 23 02:04:48 UTC 2022
           Final Date: Mon Mar 22 02:04:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ca:23:4a:82:ad:3c:2e:3e:aa:28:6f:f2:85:70:af:e8:bc:ec:80:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7054a5d7eb6abe034b8848e7298d6bfe6dd3349c
                       d187b4520539d1f9b949f314bbc8551310e48b09
                       67c36bb41c84713538ceff07d78dbdff55f067a1
                       092f93394ea0a093dd98c25bbeeac6e591b1cb04
                       bac17a2c8937910314a1fa02ef458ad5a11973b4
                       492e2f40cd413587727649d776019c4ca0d5bc66
                       d11fd7cc92e1f80b5a2c0ac0487e35641f8f604c
                       ba7b27d3686ca0a9f669cf1b11a2a3b02650e59b
                       fcb43d5dcdc8c32337e35af3ec8083ba1d3afde0
                       23fedbff7bee2e9675dbdd7769b5d111fb431dbc
                       d40c8b9fb110ce9eabff1b30435cb974e769842a
                       b8cd8dc03604204d690c422e4be9d1928025283b
                       0268d4e37f81dbba685a2df2c391d4de3852c87d
                       16315385b99d4bbd7e3d32ca9c273bff850f411a
                       398eb9c30841c52662381b3b669a5d46421367cb
                       a6cb28ff9a85fd69afdf794ed2c5918cdcb7de8d
                       1ed93bd143a958130c8f3996e4bb34cfa5c8bc91
                       7ce512db2e825364b9aa14f0c6622be3978771a9
                       e8fcf9a52cb14652a9ff174dbfb60187d52e3d4c
                       ac3b0c24
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:a8:af:34:15:58:07:7b:bf:30:76:2a:d6:29:ea:d9:46:ac:48:e5]
            modulus: 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
    public exponent: 10001

]