Results

By type

          2021-09-14 00:51:31,285 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-14 00:51:35,180 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-14 00:51:37.986  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-14 00:51:49.774 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-14 00:51:50.882  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-14 00:51:51.590  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-14 00:52:02.296  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.019 seconds (JVM running for 39.228)
2021-09-14 00:53:23.183  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 00:53:23.191 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 00:53:23.299 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-14 00:53:23.369 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 00:53:23.384  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-14 00:53:23.387  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 00:53:23.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 00:53:23.473 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 00:53:23.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 00:53:23.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 00:53:23.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 00:53:23.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 00:53:23.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 00:53:23.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 00:53:23.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 00:53:23.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 00:53:25.113  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 00:53:25.116  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 00:53:25.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 00:53:25.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 00:53:25.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 00:53:25.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 00:53:25.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 00:53:25.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 00:53:25.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 00:53:25.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 00:53:25.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 00:53:25.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 00:53:25.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 00:53:25.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 00:53:25.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 00:53:25.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 00:53:25.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:8a:c9:c2:17:33:e5:58:c8:e5:c1:1b:d2:20:aa:8a:65:df:ba:1a]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:06:34.878  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:06:34.880 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:06:34.882 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-14 04:06:34.883 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:06:34.883  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-14 04:06:34.884  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:06:34.885  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:06:34.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:06:34.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:06:34.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:06:34.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:06:34.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:06:34.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:06:34.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:06:35.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:06:35.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:06:35.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:06:35.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:06:35.115  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:06:35.116  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:06:35.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:06:35.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:06:35.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:06:35.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:06:35.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:06:35.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:06:35.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:06:35.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:06:35.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:06:35.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:06:35.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:39:f1:37:a0:bd:11:5b:39:1b:17:0e:11:f1:5b:c2:02:ea:ec:48]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:08:20.029  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:08:20.030 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:08:20.031 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 04:08:20.032 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:08:20.033  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 04:08:20.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:08:20.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:08:20.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:08:20.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:08:20.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:08:20.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:08:20.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:08:20.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:08:20.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:08:20.169  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:08:20.170  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:08:20.170 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:08:20.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:08:20.173  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:08:20.174  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:08:20.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:08:20.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:08:20.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:08:20.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:08:20.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:08:20.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:08:20.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:08:20.178 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:08:20.178 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:08:20.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:08:20.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:bf:8c:18:71:c2:e9:c6:fc:dd:3f:bb:1a:5a:29:fe:22:40:5a:b1]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:11:25.262  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:11:25.263 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:11:25.265 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 04:11:25.266 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:11:25.266  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 04:11:25.267  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:11:25.267  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:11:25.268 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:11:25.268 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:11:25.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:11:25.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:11:25.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:11:25.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:11:25.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:11:25.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:11:25.369  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:11:25.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:11:25.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:11:25.372  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:11:25.372  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:11:25.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:11:25.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:11:25.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:11:25.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:11:25.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:11:25.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:11:25.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:11:25.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:11:25.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:11:25.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:11:25.380 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:fb:94:a1:1a:79:c6:65:ad:20:f5:72:1a:f3:19:1d:4f:eb:12:9f]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:11:55.750  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:11:55.751 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:11:55.752 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-14 04:11:55.752 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:11:55.753  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-14 04:11:55.753  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:11:55.754  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:11:55.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:11:55.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:11:55.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:11:55.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:11:55.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:11:55.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:11:55.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:11:55.869  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:11:55.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:11:55.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:11:55.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:11:55.872  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:11:55.872  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:11:55.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:11:55.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:11:55.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:11:55.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:11:55.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:11:55.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:11:55.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:11:55.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:11:55.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:11:55.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:11:55.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:fd:c9:3a:ce:84:1d:b5:84:97:3f:87:12:9f:53:b2:e4:6d:aa:a4]
            modulus: babbfe21eb3cc9818e99bfb8375f177f18b5fba97fd01952defe4681b8af902c5783fe24ed5fb1476e82aef323e06774ce6c614cc8beddb061ac68561e8a57b99bc27cab8c511a7cf32e5ff02d9f06cb12ea620c2231d3eea50b086c42eed6207da7b9bdb1fb9c47348e60a0bcbcf26b854ebc942e42e2958c9927b2b251ad713c24d4e40d5bfa1a64e5632fdd56970d86648a9bd881512fb94bbdb57747ea7bc15a2a23f7e294a96d837e53ad03defb4c5926ad2876c508e01361acbcf9ac053b165190f8df2762ac6491bc556b2fa8432da46bc7fe181a75e25af53db06ef4888aa5fdbea9376f61e26ab8320fee8e160e942f119cd5a396ca7577eb1cd239
    public exponent: 10001

] 
2021-09-14 04:12:31.903  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:12:31.904 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:12:31.906 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-14 04:12:31.906 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:12:31.907  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-14 04:12:31.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:12:31.908  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:12:31.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:12:31.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:12:31.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:12:31.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:12:31.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:12:31.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:12:31.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:12:32.069  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:12:32.070  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:12:32.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:12:32.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:12:32.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:12:32.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:12:32.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:12:32.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:12:32.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:12:32.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:12:32.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:12:32.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:12:32.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:12:32.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:12:32.077 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:12:32.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:12:32.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:d3:76:e8:15:90:ab:e6:28:36:1f:13:d9:de:5e:7b:dc:35:15:80]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:12:36.595  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:12:36.596 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:12:36.598 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 04:12:36.599 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:12:36.599  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 04:12:36.600  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:12:36.600  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:12:36.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:12:36.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:12:36.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:12:36.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:12:36.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:12:36.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:12:36.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:12:36.741  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:12:36.741  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:12:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:12:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:12:36.743  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:12:36.743  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:12:36.744 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:12:36.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:12:36.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:12:36.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:12:36.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:12:36.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:12:36.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:12:36.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:12:36.772 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:12:36.772 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:12:36.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:9c:13:61:9e:d0:d3:52:72:13:24:d8:82:13:63:ca:09:4d:f1:57]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:14:36.988  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:14:36.989 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:14:36.991 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 04:14:36.991 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:14:36.992  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 04:14:36.992  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:14:36.993  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:14:36.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:14:36.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:14:36.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:14:36.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:14:36.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:14:36.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:14:37.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:14:37.090  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:14:37.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:14:37.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:14:37.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:14:37.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:14:37.094  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:14:37.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:14:37.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:14:37.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:14:37.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:14:37.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:14:37.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:14:37.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:14:37.098 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:14:37.098 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:14:37.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:14:37.102 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:00:26:93:6b:4f:21:9b:8d:16:cc:4a:7e:8f:67:3c:46:46:ec:05]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 04:15:46.723  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 04:15:46.724 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 04:15:46.725 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-14 04:15:46.728 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 04:15:46.729  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-14 04:15:46.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 04:15:46.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 04:15:46.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 04:15:46.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 04:15:46.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 04:15:46.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 04:15:46.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:15:46.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 04:15:46.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:15:46.845  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 04:15:46.846  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 04:15:46.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 04:15:46.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 04:15:46.848  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 04:15:46.869  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 04:15:46.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:15:46.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:15:46.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:15:46.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:15:46.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:15:46.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:15:46.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 04:15:46.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 04:15:46.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 04:15:46.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 04:15:46.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634250770800157687421463667002366791236263226808
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 00:45:24 UTC 2021
           Final Date: Sun Sep 14 00:45:23 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [76:88:0b:39:bd:38:87:6e:87:ef:dc:27:19:5b:25:2b:67:04:2f:d8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f4acd06d42da8476a212077d1ab6781b0262a1e
                       51884d97c651c80ebbedcd8cad51e40032258769
                       c494938d1e3844d08cf7560c4a4c837d6a27a9cc
                       786a6ca1f42ca1aa56c63a7702580a7ff9907a5f
                       ecae3af56dafc9d2fd41c4a32c3fcaa9290293fe
                       405a2bbb2fe4e075745d9475d74f408f5c446d1f
                       ea8a33dfefc9051d4e3fc8ba00410d60fc737ae6
                       cf52f191d7cd48b6e0e8c7cfeea9ae216c61d0e5
                       5afff70083b34f79fc0fc83a6403bcaf0721025b
                       2f5b85c1ffa4e4a758354dd4dd3273cda6a47113
                       adc3910668edade8044431c56b4a73ce64ec0779
                       edbfe05b1ded010f5d2e27dbcd9aae8145a7cb62
                       861eb63ace63ede3b6f77c9912d3ba1740d9e787
                       3ded4b9fdeb1c7c9284524dedebbf6775f352e87
                       a7e9ca914a7e509e664fa363bf5812d65624e78b
                       a9c9efa5b025d19f5d108aabb755145df5ac1384
                       fc87e8f93544bd74e1a8f4d967d7d51821356ac6
                       df62fa34ef1491c252ee9a50aadd3c385961324f
                       010f85e3debef48b99c181c6011c45c14e910507
                       042cf6a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:32:1f:fc:99:82:f7:e5:4f:4e:8c:b8:51:c0:59:0f:5e:22:b1:54]
            modulus: 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
    public exponent: 10001

]