Results

By type

          2021-09-21 00:54:50,013 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-21 00:54:53,823 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-21 00:54:56.332  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-21 00:55:08.025 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-21 00:55:08.921  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-21 00:55:09.522  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-21 00:55:19.832  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.804 seconds (JVM running for 38.181)
2021-09-21 00:55:55.108  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 00:55:55.124 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 00:55:55.313 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-21 00:55:55.316 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 00:55:55.412  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-21 00:55:55.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 00:55:55.418  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 00:55:55.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 00:55:55.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 00:55:55.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 00:55:55.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 00:55:55.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 00:55:55.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 00:55:55.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 00:55:55.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 00:55:55.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 00:55:57.320  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 00:55:57.323  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 00:55:57.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 00:55:57.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 00:55:57.410  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 00:55:57.411  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 00:55:57.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 00:55:57.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 00:55:57.413 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 00:55:57.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 00:55:57.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 00:55:57.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 00:55:57.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 00:55:57.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 00:55:57.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 00:55:57.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 00:55:57.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:1c:b9:dc:50:4e:d0:bb:2e:cd:26:bd:35:40:e4:be:25:0e:de:1a]
            modulus: b8247064f57cf703c88f9a45ef7f12f7c97a0639c67bc98a00061153181bb51e3a49af26bdef75984fede7c5480e131a85fa3a5ad9c5c624c2b61e3b5afdc9a240d9c20115c11117bb7e2399003fc509506c876c2d483b9fac9e27983f5a62264e1612c48bbf18340780e4619b7ceee4425ff0775a9a05e9ecd10eec31197ca3985df132fde02f4acbe504f9aa04023bf11b9edf36fa6c83989e1566f8b1ec121bde3302eea6ea0f577d1bf30373e1950efff40ea23cceb2ee0b6bd52e243e25042bdb0993c2a0402767be257a2b507c7b2c4ba9d1fb97a5d5bd4da83fe476d5c26c877b932860f8704af02aaca342929999aaaaff463f84215b3352c8e595bd
    public exponent: 10001

] 
2021-09-21 04:58:59.256  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 04:58:59.258 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 04:58:59.260 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-21 04:58:59.261 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 04:58:59.262  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-21 04:58:59.308  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 04:58:59.309  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 04:58:59.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 04:58:59.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 04:58:59.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 04:58:59.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 04:58:59.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 04:58:59.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 04:58:59.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 04:58:59.438  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 04:58:59.439  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 04:58:59.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 04:58:59.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 04:58:59.443  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 04:58:59.444  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 04:58:59.508 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 04:58:59.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 04:58:59.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 04:58:59.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 04:58:59.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 04:58:59.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 04:58:59.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 04:58:59.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 04:58:59.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 04:58:59.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 04:58:59.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: bea62fc9536bf1c8f99157e8c8820433aeefc94cad26d3c53d50eb3b56141a2278d080134d36f83b4d340d58cae2003f0ab47fb8f666a4f3ed771e5040965e85625992f43680f36623e8945e772e8d3f1ec01fe95a35a32e189431274282a4c835d1fad79b535aa863f1bf775b7e4951908197046f2b5ef29eb4f3150048bf04e4e1a1700104cc400811a9698db20fdaab843259ccdfbab96ee82d728ea5511bf08430d78b99808c918039f4014a02b08398acc4598a09a94e01cbdc3b1d211240596894e91cf747324f4d8bea4025f7e8533f3d6ad770547c6b12d0105891afaa09777852bf2959fd4cefd4952628c0f83bf7c56f037af45e7eb39a536c8725869c5105550c99f6d4f16fe1b63035dbb9af52b9d901b2806aae54a8b418484d1cf30ec87df0cf9776ca865b8fcd183b64c7d6f06c98262507ea7984a59b5133c5d86e6d84a16ef409795006fbd7352adfa70620e6b95d1b7cd400b539ced567f3f741fb92cf9fe90ec06a49862e4c020b4de831bc26beeb8150414b2c5ad925
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:a7:1a:ef:3b:93:16:5b:e1:67:19:fe:60:f1:8b:04:4d:f2:19:e2]
            modulus: d5422bb03ae3e2165a370a72a64359837eeaffa240ba516c8dc8f6eff8c813302b611819d07458b41648c8579177525a92a29003db224ab32ea0542068e65dd45784bb63f21e130a06a28842082a6d62f9818386997d0a6c5c183a312e7df784d2d8f2c08d221396204ca7b3d2be96e133e3b28e2696444498c90f537d98c9263cc0282d2be3618c7c386ed5b423a895756c28ffbae87aadbddd2358134bdb75e6e6e318e3bfc0dfc1dec6651aea5350962c03d37789a35802f7f72a06a29a77b4e9b4e0bf1b6805594e6c8080e57f743ac8297daf830085a67eedd368b3a17934d78c9ee75d2f3a3a4e8e61271313fd29c93a187a89c780917f0f9723acf19d
    public exponent: 10001

] 
2021-09-21 05:00:48.267  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:00:48.268 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:00:48.269 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-21 05:00:48.270 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:00:48.271  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-21 05:00:48.272  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:00:48.272  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:00:48.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:00:48.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:00:48.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:00:48.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:00:48.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:00:48.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:00:48.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:00:48.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:00:48.408  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:00:48.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:00:48.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:00:48.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:00:48.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:00:48.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:00:48.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:00:48.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:00:48.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:00:48.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:00:48.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:00:48.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:00:48.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:00:48.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:00:48.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:00:48.419 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:06:8e:4a:4a:03:2d:72:2f:07:af:52:60:86:99:49:e6:3b:f5:cc]
            modulus: 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
    public exponent: 10001

] 
2021-09-21 05:04:00.604  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:04:00.606 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:04:00.607 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-21 05:04:00.608 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:04:00.608  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-21 05:04:00.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:04:00.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:04:00.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:04:00.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:04:00.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:04:00.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:04:00.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:04:00.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:04:00.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:04:00.703  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:04:00.708  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:04:00.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:04:00.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:04:00.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:04:00.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:04:00.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:00.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:00.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:00.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:00.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:00.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:00.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:00.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:00.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:00.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:04:00.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:31:1a:2b:2c:5e:40:cb:b6:cd:f3:a0:21:c7:3f:01:50:28:2b:20]
            modulus: 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
    public exponent: 10001

] 
2021-09-21 05:04:09.009  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:04:09.010 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:04:09.011 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-21 05:04:09.012 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:04:09.012  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-21 05:04:09.013  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:04:09.013  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:04:09.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:04:09.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:04:09.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:04:09.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:04:09.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:04:09.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:04:09.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:04:09.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:04:09.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:04:09.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:04:09.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:04:09.107  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:04:09.108  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:04:09.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:09.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:09.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:09.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:09.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:09.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:09.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:09.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:09.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:09.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:04:09.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: bea62fc9536bf1c8f99157e8c8820433aeefc94cad26d3c53d50eb3b56141a2278d080134d36f83b4d340d58cae2003f0ab47fb8f666a4f3ed771e5040965e85625992f43680f36623e8945e772e8d3f1ec01fe95a35a32e189431274282a4c835d1fad79b535aa863f1bf775b7e4951908197046f2b5ef29eb4f3150048bf04e4e1a1700104cc400811a9698db20fdaab843259ccdfbab96ee82d728ea5511bf08430d78b99808c918039f4014a02b08398acc4598a09a94e01cbdc3b1d211240596894e91cf747324f4d8bea4025f7e8533f3d6ad770547c6b12d0105891afaa09777852bf2959fd4cefd4952628c0f83bf7c56f037af45e7eb39a536c8725869c5105550c99f6d4f16fe1b63035dbb9af52b9d901b2806aae54a8b418484d1cf30ec87df0cf9776ca865b8fcd183b64c7d6f06c98262507ea7984a59b5133c5d86e6d84a16ef409795006fbd7352adfa70620e6b95d1b7cd400b539ced567f3f741fb92cf9fe90ec06a49862e4c020b4de831bc26beeb8150414b2c5ad925
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:26:58:a6:06:0e:73:8f:ee:5b:23:bb:a8:fc:6f:17:49:7b:36:4d]
            modulus: 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
    public exponent: 10001

] 
2021-09-21 05:04:40.812  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:04:40.813 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:04:40.814 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-21 05:04:40.815 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:04:40.815  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-21 05:04:40.816  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:04:40.816  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:04:40.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:04:40.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:04:40.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:04:40.821 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:04:40.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:04:40.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:04:40.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:04:40.925  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:04:40.925  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:04:40.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:04:40.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:04:40.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:04:40.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:04:40.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:40.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:40.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:40.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:40.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:40.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:40.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:04:40.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:04:40.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:04:40.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:04:40.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:94:dd:c2:bd:57:5e:1a:59:e8:4d:9f:0e:17:16:26:e2:b4:42:73]
            modulus: cc2bbba97c4117a45de9da12887499e1e3d5e670dbf17ccf83e1cc9d00b9330318a93463c228927f8527c1dbb6ed55778fec9e68da56999c7b0c8ebe6390127ec3e6512ccf8766625e56f575bd1ba21e614a0ccb6a2efefe6145d40a646e9b8c85efd4f2f6eb005803b4f7d5ca8a98183a412c8be8fb147ccfeb635b7855fdf267790b579329588a46866b14fb2307cfdd80f5df981659519d8335c722150e435216694cdda4d84ba3c34354aee22fd281b5655ab07310a1aaf5c177c25adae6fc16d7f5b070a996afe8b68704b99a88870e6e36a6a85e590b6903513355ffb7715ebeb3328990684c9b00538053733643aff29e1c86c25a638543a14a3836c7
    public exponent: 10001

] 
2021-09-21 05:05:14.611  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:05:14.612 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:05:14.613 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-21 05:05:14.614 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:05:14.614  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-21 05:05:14.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:05:14.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:05:14.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:05:14.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:05:14.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:05:14.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:05:14.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:05:14.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:05:14.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:05:14.713  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:05:14.713  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:05:14.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:05:14.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:05:14.716  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:05:14.717  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:05:14.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:05:14.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:05:14.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:05:14.719 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:05:14.720 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:05:14.720 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:05:14.721 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:05:14.721 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:05:14.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:05:14.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:05:14.727 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: bea62fc9536bf1c8f99157e8c8820433aeefc94cad26d3c53d50eb3b56141a2278d080134d36f83b4d340d58cae2003f0ab47fb8f666a4f3ed771e5040965e85625992f43680f36623e8945e772e8d3f1ec01fe95a35a32e189431274282a4c835d1fad79b535aa863f1bf775b7e4951908197046f2b5ef29eb4f3150048bf04e4e1a1700104cc400811a9698db20fdaab843259ccdfbab96ee82d728ea5511bf08430d78b99808c918039f4014a02b08398acc4598a09a94e01cbdc3b1d211240596894e91cf747324f4d8bea4025f7e8533f3d6ad770547c6b12d0105891afaa09777852bf2959fd4cefd4952628c0f83bf7c56f037af45e7eb39a536c8725869c5105550c99f6d4f16fe1b63035dbb9af52b9d901b2806aae54a8b418484d1cf30ec87df0cf9776ca865b8fcd183b64c7d6f06c98262507ea7984a59b5133c5d86e6d84a16ef409795006fbd7352adfa70620e6b95d1b7cd400b539ced567f3f741fb92cf9fe90ec06a49862e4c020b4de831bc26beeb8150414b2c5ad925
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:17:32:a5:3b:74:3c:ff:4a:95:31:54:8c:45:04:c2:71:f7:35:8d]
            modulus: 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
    public exponent: 10001

] 
2021-09-21 05:06:33.665  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:06:33.677 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:06:33.678 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-21 05:06:33.679 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:06:33.679  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-21 05:06:33.680  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:06:33.680  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:06:33.681 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:06:33.681 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:06:33.681 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:06:33.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:06:33.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:06:33.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:06:33.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:06:33.810  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:06:33.810  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:06:33.811 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:06:33.811 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:06:33.812  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:06:33.813  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:06:33.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:06:33.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:06:33.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:06:33.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:06:33.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:06:33.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:06:33.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:06:33.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:06:33.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:06:33.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:06:33.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:c1:b1:ee:32:4d:80:c4:58:fb:82:0e:64:b5:20:ef:8a:41:c0:57]
            modulus: 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
    public exponent: 10001

] 
2021-09-21 05:06:58.810  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-21 05:06:58.811 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-21 05:06:58.812 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-21 05:06:58.813 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-21 05:06:58.813  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-21 05:06:58.814  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-21 05:06:58.814  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-21 05:06:58.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-21 05:06:58.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-21 05:06:58.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-21 05:06:58.819 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-21 05:06:58.820 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:06:58.820 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-21 05:06:58.820 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:06:58.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-21 05:06:58.908  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-21 05:06:58.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-21 05:06:58.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-21 05:06:58.910  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-21 05:06:58.910  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-21 05:06:58.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:06:58.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:06:58.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:06:58.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:06:58.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:06:58.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:06:58.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-21 05:06:58.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-21 05:06:58.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-21 05:06:58.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-21 05:06:58.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 702071084256178187426262418523344963845672420435
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 21 00:50:17 UTC 2021
           Final Date: Sun Sep 21 00:50:16 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:2a:77:c0:ce:96:fd:7f:83:ea:b4:6c:ac:d0:87:61:f8:c8:0e:d9]
            modulus: bea62fc9536bf1c8f99157e8c8820433aeefc94cad26d3c53d50eb3b56141a2278d080134d36f83b4d340d58cae2003f0ab47fb8f666a4f3ed771e5040965e85625992f43680f36623e8945e772e8d3f1ec01fe95a35a32e189431274282a4c835d1fad79b535aa863f1bf775b7e4951908197046f2b5ef29eb4f3150048bf04e4e1a1700104cc400811a9698db20fdaab843259ccdfbab96ee82d728ea5511bf08430d78b99808c918039f4014a02b08398acc4598a09a94e01cbdc3b1d211240596894e91cf747324f4d8bea4025f7e8533f3d6ad770547c6b12d0105891afaa09777852bf2959fd4cefd4952628c0f83bf7c56f037af45e7eb39a536c8725869c5105550c99f6d4f16fe1b63035dbb9af52b9d901b2806aae54a8b418484d1cf30ec87df0cf9776ca865b8fcd183b64c7d6f06c98262507ea7984a59b5133c5d86e6d84a16ef409795006fbd7352adfa70620e6b95d1b7cd400b539ced567f3f741fb92cf9fe90ec06a49862e4c020b4de831bc26beeb8150414b2c5ad925
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45f496df4a381ddd439f3c6ed84fa9c9a0063e0f
                       8b20442e3990070f9dea48a587af2782ea8db627
                       7bed411400a4651d92d4993aa1bcaafcda3db003
                       bbf31081907d429cf870f3bc4cf032ca7fab92cd
                       099b12883f28944daafbc84b9e5e0e0f4e26d3cb
                       42edfe52e9cbff63b5bfc0d2a01c7620192a3ee3
                       ddaf90141d95961ecdd80fdd7568f21c3a0ed3d8
                       ac8a42e37845f84b53be08e63cf590c4da6517cd
                       f3b988260a30a37c24d0f9db56802cb256031844
                       fb8541906150a10733c815ef4a758787a9e46840
                       173f7596c7d81b0eebdf7928f22f059da4af478f
                       957e41477ac30ac22d7c6bfd1863f4e755fb9776
                       96c77ee2b7aabcd31fc93baf11ff5d618b5f0c1e
                       1ef1e2a299429aab8c2dca10c7a20c61a4939472
                       7ab8ecaa3c1c301cd4a936a2b869933ffc6395d2
                       e1514a00f2d0f439463adda51d18bb60c1c1834a
                       6be7b3f6d3b0fb0dfae0e33be2d2026f34999147
                       7fafb596f067296e46b5c3a7308b89ab3dad2c8d
                       1311520f1c31a397e0ddaea3719e163b1e784405
                       ebc78d82
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:ea:d6:37:fd:6c:2f:de:64:94:71:04:fc:bc:b1:23:52:3f:2a:55]
            modulus: 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
    public exponent: 10001

]