Results

By type

          2022-03-25 02:21:29,315 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-25 02:21:33,217 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-25 02:21:36.108  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 25, 2022 2:21:44 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 25, 2022 2:21:44 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 25, 2022 2:21:44 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 25, 2022 2:21:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-25 02:21:46.607 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-25 02:21:47.818  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-25 02:21:48.505  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-25 02:21:51.324 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-25 02:21:51.403 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-25 02:21:51.405 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-25 02:21:51.408 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-25 02:21:51.525 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-25 02:21:51.605 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-25 02:21:52.009 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-25 02:21:55.714 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 25, 2022 2:21:58 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-25 02:21:59.624  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.299 seconds (JVM running for 39.773)
Mar 25, 2022 2:22:08 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-25 02:22:32.705  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 02:22:32.711 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 02:22:32.820 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-25 02:22:32.823 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 02:22:32.914  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-25 02:22:32.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 02:22:32.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 02:22:32.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 02:22:32.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 02:22:32.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 02:22:33.008 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 02:22:33.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 02:22:33.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 02:22:33.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 02:22:33.209 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 02:22:33.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 02:22:34.432  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 02:22:34.434  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 02:22:34.435 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 02:22:34.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 02:22:34.443  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 02:22:34.444  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 02:22:34.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 02:22:34.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 02:22:34.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 02:22:34.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 02:22:34.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 02:22:34.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 02:22:34.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 02:22:34.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 02:22:34.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 02:22:34.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 02:22:34.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:94:69:da:be:24:21:c1:a5:9b:c8:59:eb:35:f4:22:1e:cc:f0:c3]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:05:52.261  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:05:52.263 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:05:52.265 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-25 04:05:52.266 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:05:52.267  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-25 04:05:52.267  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:05:52.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:05:52.268 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:05:52.268 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:05:52.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:05:52.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:05:52.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:05:52.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:05:52.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:05:52.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:05:52.403  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:05:52.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:05:52.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:05:52.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:05:52.409  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:05:52.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:05:52.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:05:52.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:05:52.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:05:52.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:05:52.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:05:52.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:05:52.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:05:52.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:05:52.416 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:05:52.421 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:71:92:88:b2:f3:c4:94:ef:59:eb:59:88:20:a4:76:3f:47:11:de]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:10:17.981  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:10:17.982 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:10:17.983 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:10:17.984 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:10:17.984  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:10:17.985  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:10:17.985  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:10:17.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:10:17.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:10:17.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:10:17.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:10:17.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:10:17.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:10:17.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:10:18.087  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:10:18.087  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:10:18.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:10:18.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:10:18.104  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:10:18.105  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:10:18.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:18.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:18.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:18.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:18.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:18.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:18.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:18.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:18.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:18.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:10:18.113 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:78:c4:db:0f:4a:6a:bc:d3:cc:f0:ef:90:d8:af:56:b7:f8:5f:48]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:10:50.018  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:10:50.019 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:10:50.020 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-25 04:10:50.021 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:10:50.021  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-25 04:10:50.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:10:50.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:10:50.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:10:50.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:10:50.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:10:50.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:10:50.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:10:50.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:10:50.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:10:50.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:10:50.119  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:10:50.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:10:50.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:10:50.121  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:10:50.121  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:10:50.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:50.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:50.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:50.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:50.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:50.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:50.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:10:50.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:10:50.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:10:50.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:10:50.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 9df0eab27acc64f2f0891fa0b481d05526f90a35cdd82bb5847086a202ba56cd28f5e3e4bd993a57cf7c594ed78b97d6bda8872c3ce8596330d8a6f23e6d486738aafa5770893087f923a983ee2594c7f3e52897c935679c1a498c6c16a7ba3d39ba43e8c5fa380fd3f1d1bd6c2ab3411d68b53a0784cf5398db2bd924b655a1774a9750ba4f3446295447e3a070726970795eb50afc18ebf13cb153271b34a67e6b4b594f624ec3ca1e1344116e938d6ec687c0b38c4de927c82c0b2ebf3f4acad08764dd403442089c3bce7b62c08f210080999ebde1bc36aeedcc9746008413b0551319508cbc23e3d6076826b06cf102db1d8f6155d800bea46d8c50377d6fe44bea466bfff7d1a9b3697d372495cef8277c81b13c869806f0b355d98e15abc12845a53d4006c5c122a3da8f57e4392c4b30b04bfe32ae2a18d7964d34173389cfbf05b5c4b8130f6a5828643bed10f72bc44f050760141d901524d357a3708801e595277eb55c5ed25a6ecb3818cbf943f5c4262e5f861ea1bbc067e0a9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:61:3a:21:55:2a:0b:6c:61:d2:4d:c3:ef:e1:a7:0a:ad:9b:84:71]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:11:24.140  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:11:24.141 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:11:24.142 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-25 04:11:24.142 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:11:24.142  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-25 04:11:24.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:11:24.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:11:24.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:11:24.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:11:24.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:11:24.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:11:24.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:11:24.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:11:24.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:11:24.251  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:11:24.252  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:11:24.252 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:11:24.252 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:11:24.303  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:11:24.304  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:11:24.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:11:24.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:11:24.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:11:24.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:11:24.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:11:24.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:11:24.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:11:24.307 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:11:24.307 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:11:24.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:11:24.310 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:88:d5:41:8a:7b:31:a5:23:07:6e:7f:b4:bd:37:5a:a6:e5:83:99]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:13:49.358  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:13:49.359 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:13:49.361 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:13:49.362 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:13:49.362  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:13:49.362  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:13:49.363  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:13:49.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:13:49.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:13:49.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:13:49.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:13:49.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:13:49.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:13:49.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:13:49.457  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:13:49.459  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:13:49.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:13:49.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:13:49.460  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:13:49.462  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:13:49.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:13:49.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:13:49.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:13:49.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:13:49.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:13:49.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:13:49.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:13:49.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:13:49.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:13:49.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:13:49.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:cd:1d:07:f8:2e:5f:a1:a9:34:44:7e:7d:bc:e5:66:d8:27:26:5b]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:34:33.425  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:34:33.427 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:34:33.429 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:34:33.430 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:34:33.430  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-25 04:34:33.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:34:33.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:34:33.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:34:33.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:34:33.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:34:33.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:34:33.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:34:33.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:34:33.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:34:33.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:34:33.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:34:33.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:34:33.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:34:33.527  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:34:33.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:34:33.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:34:33.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:34:33.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:34:33.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:34:33.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:34:33.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:34:33.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:34:33.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:34:33.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:34:33.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:34:33.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:1c:80:b4:4d:67:ab:58:a0:52:2d:b2:a1:7f:34:78:37:94:4d:36]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:35:45.677  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:35:45.679 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:35:45.680 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:35:45.680 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:35:45.681  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-25 04:35:45.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:35:45.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:35:45.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:35:45.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:35:45.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:35:45.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:35:45.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:35:45.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:35:45.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:35:45.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:35:45.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:35:45.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:35:45.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:35:45.786  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:35:45.786  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:35:45.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:35:45.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:35:45.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:35:45.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:35:45.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:35:45.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:35:45.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:35:45.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:35:45.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:35:45.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:35:45.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:7e:70:a9:66:6f:57:f2:a3:b7:d2:12:ab:c8:16:cd:d4:77:7a:ad]
            modulus: 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
    public exponent: 10001

] 
2022-03-25 04:37:19.188  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-25 04:37:19.189 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-25 04:37:19.190 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-25 04:37:19.190 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-25 04:37:19.191  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-25 04:37:19.191  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-25 04:37:19.191  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-25 04:37:19.191 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-25 04:37:19.191 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-25 04:37:19.192 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-25 04:37:19.195 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-25 04:37:19.196 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:37:19.196 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-25 04:37:19.196 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:37:19.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-25 04:37:19.287  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-25 04:37:19.287 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-25 04:37:19.287 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-25 04:37:19.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-25 04:37:19.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-25 04:37:19.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:37:19.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:37:19.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:37:19.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:37:19.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:37:19.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:37:19.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-25 04:37:19.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-25 04:37:19.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-25 04:37:19.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-25 04:37:19.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602113525676466842051713643072655267078819169997
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Mar 25 02:17:45 UTC 2022
           Final Date: Wed Mar 24 02:17:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:80:24:64:f0:39:0b:bf:7a:93:36:fe:59:7d:8a:22:fe:2d:3d:a1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4c920293af9a27bf842f61ba89df12a7e9068c20
                       b32f71bf6090e2aa89ee630f6a7bce33973164aa
                       fdff1d8b7a196b65fccc00db935a932497c68a54
                       96db893b576895ade8f524e488fc373ba69dc446
                       def6b67f81bc5a1452a28aef10a49ac9bb5a4254
                       36ad1369d36dab4b21d32fdc5addc9ebf8c3f0b7
                       5258dc224b090da2a61f82639cf422e8c821d719
                       6073abf72d1924ad513e59914e4fc9ae7cf33bfe
                       a9bdfaa9189900bf7f7f8e24d1aaff94f9a873d2
                       5add7700d38534c4ac44fbd666f94987989b7897
                       12d79012e3292679b98d9192baf3c6000d591cd7
                       67adaa069a45f2a68690254fda7ba48a29b85514
                       44cc32a21b98beab0de15ef966934b99960a04e1
                       bd668edb8dd727940733de98b91b3216fb46ea5b
                       c2b2391fbbf673c3a46af1474d29b52ad6acddc7
                       027db582b93e56152e00ac6dc20486f504ff41f0
                       4b441921dde537635ec00dd154eeb3581fdbc649
                       fe4c1d4095afce981dfce6eadec099bc79ddc47d
                       b25894fdb48aff2c225781e95bd86ed997431464
                       e15ed523
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:79:ce:15:d3:eb:46:7a:bb:c7:0a:07:3c:e9:12:dd:57:f7:58:59]
            modulus: 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
    public exponent: 10001

]