Results

By type

          2021-09-13 08:33:28,103 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-13 08:33:32,116 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-13 08:33:35.232  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-13 08:33:48.119 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-13 08:33:49.010  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-13 08:33:49.717  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-13 08:34:02.428  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 36.315 seconds (JVM running for 43.46)
2021-09-13 08:35:51.219  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 08:35:51.315 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 08:35:51.512 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-13 08:35:51.518 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 08:35:51.606  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-13 08:35:51.609  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 08:35:51.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 08:35:51.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 08:35:51.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 08:35:51.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 08:35:51.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 08:35:51.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 08:35:51.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 08:35:51.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 08:35:51.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 08:35:51.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 08:35:53.815  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 08:35:53.818  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 08:35:53.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 08:35:53.820 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 08:35:53.912  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 08:35:53.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 08:35:53.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 08:35:53.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 08:35:53.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 08:35:54.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 08:35:54.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 08:35:54.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 08:35:54.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 08:35:54.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 08:35:54.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 08:35:54.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 08:35:54.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:45:46:17:2d:15:cb:4e:8d:7a:20:d2:97:dd:7d:a1:ce:eb:e0:4f]
            modulus: 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
    public exponent: 10001

] 
2021-09-13 11:39:32.707  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:39:32.710 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:39:32.712 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-13 11:39:32.713 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:39:32.713  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-13 11:39:32.714  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:39:32.714  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:39:32.714 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:39:32.715 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:39:32.715 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:39:32.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:39:32.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:39:32.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:39:32.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:39:32.924  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:39:32.925  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:39:32.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:39:32.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:39:32.930  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:39:32.930  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:39:32.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:39:32.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:39:32.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:39:32.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:39:32.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:39:32.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:39:33.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:39:33.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:39:33.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:39:33.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:39:33.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: be3f1fc41645ef0f3282ac1308779544a1e13567de88a279c78e73058b4d004c3ed5c51e3399500820400a93fd9bd92957d937310889c996f317f72e8855767b6632bbfb75e2612fa31e1ebc505ab308b12d16533f8660a3dec0e1cfd355676a38e25bfc91d88b021bf22645eb6283b9a4cda577bc7e032cebdbe849e8ad07d1eb4da07a4127a134888b5428bc4d850f064524ab8ce1f66dd707538d29fe84db2d35990ca280a30383b6816e303f80e2762b9f0105e92cd6d32ed201d545c54858324b9a6f1164141174e616f0f6c864c1b1efafee6bc029b34f93edc8fd47dc96d9b0d6427d659f233e9f3d36db98efb73d3dfff15ab7404158c97940273def604336085f81e173f0c61d789c0313600fbb305838b4b73686d6aef027a7eaf1cb9ba94348842dba5b8c117c9d4bd2551c308f50a1a69f98124d334f7ae5042207fd78467c1e60abec37c4e3eae97d385ece8a589d3ee7800c2fbec8a7413b7bc910682cad69a74058a2019a1d570e60b11f9a567ec2ac275765d1202bc3ff57
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:39:a1:5a:ee:61:88:63:24:ac:9c:01:e7:e3:3f:a1:95:aa:64:44]
            modulus: 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
    public exponent: 10001

] 
2021-09-13 11:41:30.921  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:41:30.922 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:41:30.924 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-13 11:41:30.925 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:41:30.927  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-13 11:41:30.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:41:30.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:41:30.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:41:30.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:41:30.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:41:30.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:41:30.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:41:30.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:41:30.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:41:31.092  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:41:31.092  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:41:31.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:41:31.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:41:31.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:41:31.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:41:31.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:41:31.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:41:31.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:41:31.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:41:31.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:41:31.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:41:31.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:41:31.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:41:31.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:41:31.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:41:31.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:f9:f6:f1:49:a9:e0:7c:31:e5:37:17:4d:6e:16:63:25:2f:87:7a]
            modulus: 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
    public exponent: 10001

] 
2021-09-13 11:44:50.633  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:44:50.634 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:44:50.636 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-13 11:44:50.636 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:44:50.637  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-13 11:44:50.637  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:44:50.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:44:50.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:44:50.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:44:50.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:44:50.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:44:50.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:44:50.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:44:50.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:44:50.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:44:50.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:44:50.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:44:50.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:44:50.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:44:50.803  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:44:50.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:44:50.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:44:50.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:44:50.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:44:50.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:44:50.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:44:50.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:44:50.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:44:50.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:44:50.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:44:50.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:41:45:42:69:1f:d2:7a:67:ac:5c:1d:2e:af:2f:e8:13:16:90:3e]
            modulus: 97e582c692cfe39c51d3487149c3cfd266b98caa90aad4ccb98a4df4310d2892c9e827de7473c68982f60d98e4a776b8b26293ca64f6d62596ea7f6f615c9d04a8caa1b010708a627cd00accac6f2966b5448873124662e0a08a07b7b6a94eda1b1f6b302f282852bd7f95e8fc310d42a614d72b17e57e24fc6bd766a2fd690e7017771f279d9bfd2d051e14c907834fa35610a7b464ffc819ae88d8e0b0d498b4e1c03b5bffa5366123f8a13eb115a1ca8cd2fcd2118e063501a8b83d508dfe25e1861b9151357d415196f8695a7609def2d0e808388d24e91a3124ad2ec924004c26fbd82147af2356d4faeebff7e897caf47b75c09561a1ba3691c6b49d53
    public exponent: 10001

] 
2021-09-13 11:45:21.510  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:45:21.510 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:45:21.511 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-13 11:45:21.512 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:45:21.512  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-13 11:45:21.512  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:45:21.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:45:21.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:45:21.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:45:21.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:45:21.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:45:21.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:45:21.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:45:21.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:45:21.608  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:45:21.609  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:45:21.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:45:21.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:45:21.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:45:21.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:45:21.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:45:21.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:45:21.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:45:21.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:45:21.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:45:21.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:45:21.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:45:21.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:45:21.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:45:21.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:45:21.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:56:53:d2:c0:07:71:f1:50:1d:ce:c4:6c:dc:65:f8:52:1c:eb:df]
            modulus: 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
    public exponent: 10001

] 
2021-09-13 11:45:55.072  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:45:55.073 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:45:55.073 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-13 11:45:55.074 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:45:55.074  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-13 11:45:55.075  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:45:55.075  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:45:55.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:45:55.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:45:55.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:45:55.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:45:55.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:45:55.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:45:55.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:45:55.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:45:55.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:45:55.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:45:55.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:45:55.794  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:45:55.795  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:45:55.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:45:55.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:45:55.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:45:55.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:45:55.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:45:55.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:45:55.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:45:55.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:45:55.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:45:55.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:45:55.802 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:19:62:a6:7f:c5:7d:e8:1e:52:bc:f6:ca:ca:e6:3d:37:d4:53:ad]
            modulus: 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
    public exponent: 10001

] 
2021-09-13 11:46:03.624  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:46:03.624 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:46:03.625 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-13 11:46:03.626 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:46:03.626  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-13 11:46:03.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:46:03.627  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:46:03.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:46:03.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:46:03.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:46:03.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:46:03.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:46:03.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:46:03.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:46:03.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:46:03.705  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:46:03.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:46:03.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:46:03.709  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:46:03.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:46:03.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:46:03.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:46:03.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:46:03.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:46:03.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:46:03.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:46:03.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:46:03.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:46:03.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:46:03.716 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:46:03.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: be3f1fc41645ef0f3282ac1308779544a1e13567de88a279c78e73058b4d004c3ed5c51e3399500820400a93fd9bd92957d937310889c996f317f72e8855767b6632bbfb75e2612fa31e1ebc505ab308b12d16533f8660a3dec0e1cfd355676a38e25bfc91d88b021bf22645eb6283b9a4cda577bc7e032cebdbe849e8ad07d1eb4da07a4127a134888b5428bc4d850f064524ab8ce1f66dd707538d29fe84db2d35990ca280a30383b6816e303f80e2762b9f0105e92cd6d32ed201d545c54858324b9a6f1164141174e616f0f6c864c1b1efafee6bc029b34f93edc8fd47dc96d9b0d6427d659f233e9f3d36db98efb73d3dfff15ab7404158c97940273def604336085f81e173f0c61d789c0313600fbb305838b4b73686d6aef027a7eaf1cb9ba94348842dba5b8c117c9d4bd2551c308f50a1a69f98124d334f7ae5042207fd78467c1e60abec37c4e3eae97d385ece8a589d3ee7800c2fbec8a7413b7bc910682cad69a74058a2019a1d570e60b11f9a567ec2ac275765d1202bc3ff57
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:d9:46:13:e6:76:92:b6:1e:95:e0:06:70:3f:6e:0b:84:58:f2:7e]
            modulus: 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
    public exponent: 10001

] 
2021-09-13 11:48:01.220  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:48:01.220 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:48:01.221 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-13 11:48:01.222 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:48:01.222  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-13 11:48:01.222  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:48:01.222  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:48:01.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:48:01.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:48:01.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:48:01.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:48:01.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:48:01.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:48:01.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:48:01.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:48:01.311  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:48:01.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:48:01.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:48:01.312  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:48:01.312  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:48:01.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:48:01.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:48:01.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:48:01.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:48:01.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:48:01.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:48:01.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:48:01.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:48:01.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:48:01.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:48:01.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:42:4b:8b:45:79:7d:c2:e5:de:d8:d7:c4:46:13:eb:66:4c:07:49]
            modulus: e5aec53dd79ac4466d1b741c26ec4fd90c113bbb49e964f18c10f2697179cf5797ff47d5555610e87db62d2b87c881eeb450425e3a1884ddf19933f71f5d400b434012003f77f3fa4eb066aaec71e01554880e7954cb1027bb75bb7ada7530624500afa268ec19ab43b0df3a70236259ac27a18e60715b0fc6eba9835eca698b02a5fdcb4a84725f86c1bc12a2baf261754f4e9506afa08cc2c1701e1d715368d3d6e34fbcb5f98c9fbd2cff3e016b32031cbfa075734f1bb48f9fc0cd20efa11b8bad6a0f76d6272b5647d14b67f54ef46dab7be7ebaf254620ea01e4a0f1508d82ffe3cda7570f789904d463deaa9b453baacfb38b515919da00c4aaf07c71
    public exponent: 10001

] 
2021-09-13 11:48:56.038  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-13 11:48:56.039 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-13 11:48:56.040 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-13 11:48:56.040 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-13 11:48:56.041  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-13 11:48:56.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-13 11:48:56.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-13 11:48:56.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-13 11:48:56.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-13 11:48:56.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-13 11:48:56.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-13 11:48:56.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:48:56.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-13 11:48:56.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:48:56.140  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-13 11:48:56.140  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-13 11:48:56.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-13 11:48:56.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-13 11:48:56.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-13 11:48:56.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-13 11:48:56.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:48:56.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:48:56.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:48:56.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:48:56.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:48:56.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:48:56.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-13 11:48:56.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-13 11:48:56.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-13 11:48:56.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-13 11:48:56.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203558007395141916375643873497247823833522663892
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Sep 13 08:30:04 UTC 2021
           Final Date: Sat Sep 13 08:30:03 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6a:f8:58:14:47:0b:6e:70:db:63:85:e5:df:0d:cf:e3:cc:5f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e72179ac7bebb1fc0e6e113d4395b185e759133
                       d897bfaf371a473b8fc70a4b3ffc46ca903244f5
                       4a778b9cb1eddbe2bf432afb7021f01020304da7
                       97d5bb7a67a5892062320625e5803c4eda3ca215
                       533152baf456ea602812407e0a753d680063bda7
                       d06e09a54d746bd07d03fc4673b495eb38014ace
                       962cf5067aad0d650cc05ae6bb4535b10975c74e
                       4a22c8794720fc6921ae796b9dafeeee245bba2e
                       32d928169ea75d3261e35cc0b9f04cac52c8d448
                       585ece101c099f2890e2fa72ae395f96bdc8e857
                       065cfe7c48733099cfd594b9b498239dd13825f1
                       694a0e4134f89e8ec2c167288f7790d497873532
                       7208d78835d2b564f706c0424ea58d3c3e31bd0c
                       04e29e5711c60dfd479abfa69fd456046d4e527c
                       de07a353b165fc97170dc1d3c54b9f111d51465c
                       272933c3714424e6dc26af98b0387651999b3a01
                       65e64ecbc2ae88ec5cec5e6daff2dd4f38a91959
                       42afa37a606b0388b7b27c6f689fa630d08ec998
                       7acb9c47bc6c87303d29eb49f2aab9284662b443
                       0863c640
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:80:bf:75:09:81:ab:e5:45:5b:8e:46:49:31:d4:e9:f3:d3:58:4c]
            modulus: caadcde5d8bc4245e4dff4c397cd0a57d8b375be5bd9f16f22daceac7fe0acf47b7bea81f23ce937567d78ddae06aff9707616ce65ae20b8ad168360f018aee66681c679331e904e64adb41d96a79ab201519195bb53242893efa802601b248f7965692e26aa7d1772b635e4beefdadb92c8faa21a50b19e5a0c485553276e9e2ba8a6fc9662797ab3b9e92bda9ed7cd896cdaa7e672bbf54d9590a06833638d438ac4d941efa773d8a2cb317fb9acf3609ff93625ef51c80f47f700a82116de822d1623f22c0a6be8b3fc451958f25a4fac5936ec3a3548a22fdc9521dce7bcc423d96e85199bb93cf5feee7a92f6a36dd1079472a3acbc2b70dfbdfbd85579
    public exponent: 10001

]