Results

By type

          2021-09-11 00:36:51,572 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-11 00:36:56,170 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-11 00:36:59.285  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-11 00:37:14.687 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-11 00:37:15.988  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-11 00:37:16.790  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-11 00:37:30.168  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.999 seconds (JVM running for 48.556)
2021-09-11 00:38:35.980  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 00:38:36.077 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 00:38:36.191 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-11 00:38:36.272 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 00:38:36.377  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-11 00:38:36.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 00:38:36.383  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 00:38:36.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 00:38:36.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 00:38:36.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 00:38:36.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 00:38:36.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 00:38:36.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 00:38:36.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 00:38:36.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 00:38:36.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 00:38:38.421  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 00:38:38.425  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 00:38:38.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 00:38:38.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 00:38:38.473  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 00:38:38.474  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 00:38:38.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 00:38:38.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 00:38:38.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 00:38:38.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 00:38:38.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 00:38:38.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 00:38:38.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 00:38:38.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 00:38:38.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 00:38:38.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 00:38:38.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:2a:33:f4:8b:ca:29:8d:15:b9:6c:d9:e9:68:1d:8b:98:62:6a:69]
            modulus: b62c7a2aeb903df101f2a638c8de179e43b3de08b5b5d77a0074cc94e1fe210627d9eaa6bd6fc46fc9ffd16b0756aa734bc9761f7eac11485c7191f97bd670202225d4fe9e479fd926eaf72eedad03724c2e337f6601defcbd1dd948dbb76e63f5a50773645df30ee99538cb00f841d92e8cb245c6baa2a2b5100771dd5c686de25e5b477f62081e634cdccb685a65f9cf352f918671218b360bbb199568a76e407e4e808d252c2cbb25ee7af2fea99fe776345856dbb6714cdf15d71f804f789499da1a49570acd36dbaf39e1784203b5bac930b26141012e1d4da45112f8e1be595819a72f15362d06b5291399bc0dddd2e777ef77ae4d6717babbcdd9daab
    public exponent: 10001

] 
2021-09-11 03:35:59.530  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:35:59.531 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:35:59.533 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-11 03:35:59.534 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:35:59.536  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-11 03:35:59.537  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:35:59.537  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:35:59.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:35:59.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:35:59.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:35:59.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:35:59.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:35:59.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:35:59.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:35:59.793  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:35:59.793  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:35:59.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:35:59.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:35:59.796  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:35:59.797  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:35:59.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:35:59.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:35:59.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:35:59.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:35:59.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:35:59.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:35:59.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:35:59.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:35:59.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:35:59.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:35:59.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:1f:c7:92:81:cd:f6:a5:67:20:34:f6:f5:98:5f:89:59:db:fe:4e]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:41:11.128  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:41:11.129 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:41:11.131 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 03:41:11.131 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:41:11.132  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 03:41:11.132  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:41:11.132  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:41:11.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:41:11.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:41:11.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:41:11.140 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:41:11.140 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:41:11.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:41:11.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:41:11.264  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:41:11.265  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:41:11.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:41:11.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:41:11.269  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:41:11.270  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:41:11.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:11.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:11.271 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:11.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:11.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:11.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:11.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:11.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:11.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:11.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:41:11.278 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:95:16:b7:5c:d0:27:24:56:2b:d4:93:20:2e:e3:5f:ab:a8:f9:44]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:41:16.619  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:41:16.620 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:41:16.621 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 03:41:16.621 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:41:16.621  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 03:41:16.622  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:41:16.622  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:41:16.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:41:16.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:41:16.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:41:16.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:41:16.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:41:16.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:41:16.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:41:16.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:41:16.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:41:16.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:41:16.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:41:16.769  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:41:16.770  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:41:16.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:16.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:16.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:16.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:16.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:16.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:16.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:16.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:16.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:16.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:41:16.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:c4:3a:a4:c6:2f:31:89:e1:6a:b7:15:d9:15:50:81:d5:11:a6:39]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:41:42.402  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:41:42.402 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:41:42.403 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-11 03:41:42.404 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:41:42.404  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-11 03:41:42.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:41:42.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:41:42.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:41:42.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:41:42.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:41:42.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:41:42.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:41:42.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:41:42.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:41:42.547  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:41:42.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:41:42.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:41:42.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:41:42.569  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:41:42.570  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:41:42.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:42.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:42.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:42.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:42.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:42.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:42.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:41:42.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:41:42.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:41:42.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:41:42.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:97:40:0a:e3:d1:d4:ef:76:a3:82:3f:30:25:c4:fb:95:f2:bd:96]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:42:15.596  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:42:15.597 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:42:15.599 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-11 03:42:15.599 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:42:15.599  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-11 03:42:15.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:42:15.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:42:15.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:42:15.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:42:15.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:42:15.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:42:15.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:42:15.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:42:15.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:42:15.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:42:15.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:42:15.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:42:15.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:42:15.767  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:42:15.767  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:42:15.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:42:15.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:42:15.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:42:15.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:42:15.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:42:15.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:42:15.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:42:15.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:42:15.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:42:15.774 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:42:15.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:3f:04:e9:92:b0:7d:dd:7c:4c:e8:d0:6d:e8:92:d7:a2:7a:0f:bc]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:43:09.832  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:43:09.833 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:43:09.834 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 03:43:09.835 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:43:09.835  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-11 03:43:09.836  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:43:09.836  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:43:09.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:43:09.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:43:09.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:43:09.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:43:09.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:43:09.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:43:09.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:43:09.956  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:43:09.957  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:43:09.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:43:09.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:43:09.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:43:09.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:43:09.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:43:09.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:43:09.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:43:09.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:43:09.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:43:09.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:43:09.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:43:09.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:43:09.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:43:09.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:43:09.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:cc:1e:2a:32:5f:bc:9a:76:6b:7f:2d:f6:a4:9f:d7:ad:7c:3b:76]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:44:00.737  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:44:00.738 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:44:00.740 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 03:44:00.740 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:44:00.741  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-11 03:44:00.741  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:44:00.742  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:44:00.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:44:00.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:44:00.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:44:00.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:44:00.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:44:00.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:44:00.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:44:00.851  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:44:00.867  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:44:00.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:44:00.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:44:00.870  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:44:00.870  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:44:00.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:44:00.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:44:00.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:44:00.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:44:00.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:44:00.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:44:00.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:44:00.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:44:00.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:44:00.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:44:00.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:79:99:97:19:2a:2d:c0:a7:f3:ee:1e:10:ed:05:b4:52:56:9f:65]
            modulus: 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
    public exponent: 10001

] 
2021-09-11 03:45:20.393  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-11 03:45:20.394 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-11 03:45:20.396 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-11 03:45:20.396 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-11 03:45:20.396  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-11 03:45:20.397  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-11 03:45:20.397  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-11 03:45:20.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-11 03:45:20.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-11 03:45:20.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-11 03:45:20.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-11 03:45:20.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:45:20.402 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-11 03:45:20.402 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:45:20.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-11 03:45:20.475  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-11 03:45:20.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-11 03:45:20.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-11 03:45:20.476  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-11 03:45:20.477  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-11 03:45:20.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:45:20.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:45:20.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:45:20.478 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:45:20.478 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:45:20.478 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:45:20.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-11 03:45:20.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-11 03:45:20.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-11 03:45:20.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-11 03:45:20.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 460924181583777833137481582771249782097871870773
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 11 00:33:38 UTC 2021
           Final Date: Thu Sep 11 00:33:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:a0:87:4d:ec:5a:32:05:f8:89:30:17:d7:92:e8:3f:af:be:73:c9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0dc6c4ebc0ea9672c9de9672aeb605f6e5832552
                       3dd43912fafe39986d69c371eb5b998cf3e52fca
                       738212f1da7bfa5d26c400c2e6331c78e93085a0
                       bcab81a3d157fb23d5c08d82e68b20c4cd993fcd
                       5e32f55248ec3069a13c4b8e63bfd7cd31464c77
                       57fe221b9ccff7bb571841e31ba086b85aa6d6d3
                       592a5ae9984f06ab1deb98558d0c50c3a7abde1b
                       135ebb2c02506aae373d7a9923e141c6a4843e56
                       dffb813548db2e622b8c69db7bc664f05eff2364
                       47e0c6f011294a207f8598187a108aef8479093b
                       48495a5cf3f17e828c7a48495f0e119dde839eef
                       3704e97f213eaceae8e81b12914e362fe94ab37a
                       ceda197cd817e0ff9760925eb20c915fd95e2a99
                       2e6e19a77f30f26f4a467221badb3d57a425d246
                       6fd9a05895f51a460d48d1fde589fab93fc027e8
                       bfbe70e68feefe002ac8523d0a4e4b430a642e38
                       e75aae0f0ca8a3b37bdc7d737d22c93206072d87
                       628dbae1f25ba772e13ba76f9b52a5e719c1c007
                       523a6fc3fd80213219b54bb0e69d33b6009cb0ef
                       1ec58b39
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:3a:81:75:df:74:c3:3c:27:a4:7d:9c:46:18:21:24:b2:48:e8:3a]
            modulus: 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
    public exponent: 10001

]