Results

By type

          2021-09-30 01:42:50,616 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-30 01:42:54,313 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-30 01:42:56.714  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-30 01:43:08.236 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-30 01:43:09.119  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-30 01:43:09.711  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-30 01:43:20.722  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.095 seconds (JVM running for 38.497)
2021-09-30 01:43:52.223  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 01:43:52.311 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 01:43:52.426 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-30 01:43:52.429 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 01:43:52.513  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-30 01:43:52.516  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 01:43:52.517  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 01:43:52.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 01:43:52.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 01:43:52.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 01:43:52.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 01:43:52.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 01:43:52.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 01:43:52.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 01:43:52.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 01:43:52.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 01:43:54.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 01:43:54.012  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 01:43:54.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 01:43:54.025 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 01:43:54.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 01:43:54.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 01:43:54.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 01:43:54.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 01:43:54.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 01:43:54.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 01:43:54.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 01:43:54.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 01:43:54.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 01:43:54.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 01:43:54.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 01:43:54.213 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 01:43:54.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:40:24:5b:c7:1c:d3:fa:9f:71:09:0a:31:97:53:e4:50:52:21:59]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:48:30.784  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:48:30.786 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:48:30.788 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-30 05:48:30.808 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:48:30.809  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-30 05:48:30.810  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:48:30.810  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:48:30.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:48:30.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:48:30.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:48:30.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:48:30.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:48:30.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:48:30.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:48:31.042  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:48:31.043  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:48:31.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:48:31.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:48:31.047  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:48:31.048  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:48:31.048 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:48:31.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:48:31.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:48:31.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:48:31.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:48:31.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:48:31.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:48:31.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:48:31.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:48:31.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:48:31.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:f5:cc:d8:ed:67:f5:14:16:a1:a3:5c:5c:2d:69:01:82:c8:16:29]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:50:12.541  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:50:12.542 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:50:12.543 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 05:50:12.544 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:50:12.544  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 05:50:12.545  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:50:12.546  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:50:12.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:50:12.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:50:12.547 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:50:12.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:50:12.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:50:12.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:50:12.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:50:12.725  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:50:12.726  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:50:12.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:50:12.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:50:12.728  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:50:12.729  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:50:12.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:50:12.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:50:12.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:50:12.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:50:12.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:50:12.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:50:12.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:50:12.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:50:12.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:50:12.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:50:12.740 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:be:3e:45:18:b0:fd:7e:ff:21:9f:7c:42:6a:04:15:36:7d:53:80]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:53:26.260  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:53:26.261 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:53:26.263 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 05:53:26.263 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:53:26.264  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 05:53:26.264  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:53:26.265  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:53:26.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:53:26.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:53:26.266 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:53:26.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:53:26.307 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:53:26.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:53:26.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:53:26.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:53:26.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:53:26.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:53:26.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:53:26.408  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:53:26.408  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:53:26.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:53:26.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:53:26.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:53:26.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:53:26.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:53:26.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:53:26.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:53:26.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:53:26.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:53:26.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:53:26.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:04:c4:e8:f1:11:9c:3f:4a:6e:ec:10:a3:68:eb:37:94:25:0d:c9]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:53:39.167  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:53:39.168 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:53:39.169 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 05:53:39.170 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:53:39.170  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 05:53:39.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:53:39.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:53:39.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:53:39.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:53:39.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:53:39.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:53:39.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:53:39.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:53:39.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:53:39.266  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:53:39.311  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:53:39.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:53:39.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:53:39.313  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:53:39.313  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:53:39.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:53:39.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:53:39.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:53:39.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:53:39.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:53:39.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:53:39.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:53:39.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:53:39.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:53:39.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:53:39.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:41:67:3d:3f:a4:60:10:53:07:ce:66:e4:89:9a:1e:38:df:54:f2]
            modulus: b966da1aa61ba3679e5d3dbfb977943f120c097a2e34b59ed54c49a5af13508cb57945ee57e682d561420f8df239a861aec81f28f584dc830c5fef72f6629a8d2e8758ff2d87dd137901bf3e6a08a555d6508595807c678e031741a96d0dd0db798b4b122c08bc6093d2140acc2623e3aafd25c709fe88fea783cd3b68f993fb0156791e39f8fe83c745efa3d8892454b471f9346842a6791bdff001970abbbfc79a516e6ff8085377c831d98f09802cb75634052c7bd86f0eb93ff66df633964557691580d297842290587f18591be59d82a6bdecd32cf9f436a269774b0fa3b194cdffaf39ebaa461559c851d2533916dce96b803240c057705c226ebd1e63
    public exponent: 10001

] 
2021-09-30 05:54:11.952  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:54:11.953 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:54:11.954 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-30 05:54:11.955 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:54:11.955  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-30 05:54:11.956  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:54:11.956  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:54:11.956 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:54:11.957 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:54:11.957 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:54:11.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:54:11.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:54:11.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:54:11.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:54:12.028  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:54:12.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:54:12.029 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:54:12.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:54:12.031  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:54:12.031  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:54:12.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:54:12.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:54:12.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:54:12.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:54:12.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:54:12.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:54:12.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:54:12.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:54:12.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:54:12.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:54:12.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:2d:87:1f:7d:46:4c:b4:86:32:8a:f8:f1:b8:31:4b:a2:44:e3:46]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:54:45.145  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:54:45.146 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:54:45.147 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-30 05:54:45.147 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:54:45.148  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-30 05:54:45.148  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:54:45.149  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:54:45.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:54:45.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:54:45.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:54:45.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:54:45.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:54:45.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:54:45.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:54:45.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:54:45.228  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:54:45.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:54:45.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:54:45.229  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:54:45.229  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:54:45.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:54:45.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:54:45.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:54:45.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:54:45.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:54:45.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:54:45.232 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:54:45.232 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:54:45.232 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:54:45.233 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:54:45.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:97:e7:c3:ce:91:d8:d2:dc:ce:8e:88:a6:77:f8:07:3a:e4:d6:90]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:55:36.827  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:55:36.828 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:55:36.830 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-30 05:55:36.830 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:55:36.830  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-30 05:55:36.831  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:55:36.831  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:55:36.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:55:36.832 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:55:36.832 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:55:36.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:55:36.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:55:36.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:55:36.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:55:37.007  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:55:37.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:55:37.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:55:37.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:55:37.009  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:55:37.010  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:55:37.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:55:37.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:55:37.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:55:37.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:55:37.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:55:37.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:55:37.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:55:37.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:55:37.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:55:37.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:55:37.016 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:3c:e0:85:eb:fc:f0:b4:ac:a6:da:29:f9:c5:28:63:b3:2c:6b:33]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 05:56:30.760  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 05:56:30.761 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 05:56:30.762 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 05:56:30.763 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 05:56:30.763  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 05:56:30.764  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 05:56:30.764  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 05:56:30.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 05:56:30.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 05:56:30.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 05:56:30.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 05:56:30.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:56:30.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 05:56:30.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:56:30.869  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 05:56:30.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 05:56:30.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 05:56:30.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 05:56:30.872  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 05:56:30.872  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 05:56:30.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:56:30.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:56:30.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:56:30.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:56:30.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:56:30.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:56:30.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 05:56:30.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 05:56:30.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 05:56:30.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 05:56:30.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 224870844204398726051234466202418633263501096520
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 01:39:26 UTC 2021
           Final Date: Tue Sep 30 01:39:25 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:a4:f0:ec:88:52:49:77:55:2c:3e:63:aa:27:ae:82:2d:19:70:84]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63e9999647a12132007f8c59058c1a615fb98152
                       ca4233836ea972af2793bce979b44f58648c6d41
                       40473407502dc5ff1405039f1fdb06805368ec10
                       a9350536b6bd787d29666effc5970b0abcb0a5e6
                       19d346cf6591f98bd068c451d626f7ed3d2ef74c
                       28029a1b1bdc0b4181f780fd16f99ca8e4e9f267
                       9be3058046cef8e8399ba54f980ef0fbea72bc80
                       cb596a63b06291d55724bd8309c01680a048a0be
                       6a746483cf2b503a5564cc51386dfafdf83fe587
                       61bfd4025097f3ff95f0302813642205d4c87691
                       bfe4e94e64d77a93193513709135d8f646b8c9b8
                       eec199f531d02803081ef0f5de88a92685af3c32
                       c682f508bc62125e4844fc96008a78d8caa79842
                       61a58c66b0169f6a8dd12e8762b4f1cc057946fd
                       24e068a43e2462902ab22944eba7df5617778a44
                       acfef3d36454c50dd59cae5d0fb65107cd3ab510
                       535e71a1569095790ff313abe0009eb147424bef
                       2e1c6c9ecff520699f280490d65c76b6afc49c1d
                       24a9b546bd6b0c2c3352b4a036db5bbde85124c3
                       a161ee9c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:3d:3c:82:b9:eb:f5:77:3a:37:72:86:0e:2b:60:d4:48:b8:4b:de]
            modulus: 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
    public exponent: 10001

]