Results

By type

          2021-10-10 01:45:05,401 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-10 01:45:09,703 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-10 01:45:12.798  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-10 01:45:27.092 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-10 01:45:28.394  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-10 01:45:29.003  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-10 01:45:41.592  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.595 seconds (JVM running for 46.657)
2021-10-10 01:46:22.997  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 01:46:23.089 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 01:46:23.203 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-10 01:46:23.206 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 01:46:23.297  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-10 01:46:23.300  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 01:46:23.301  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 01:46:23.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 01:46:23.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 01:46:23.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 01:46:23.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 01:46:23.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 01:46:23.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 01:46:23.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 01:46:23.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 01:46:23.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 01:46:24.999  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 01:46:25.002  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 01:46:25.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 01:46:25.086 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 01:46:25.099  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 01:46:25.100  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 01:46:25.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 01:46:25.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 01:46:25.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 01:46:25.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 01:46:25.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 01:46:25.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 01:46:25.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 01:46:25.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 01:46:25.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 01:46:25.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 01:46:25.495 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:1b:15:55:54:b4:f8:1e:ce:56:06:6a:91:38:ed:43:1d:c5:d6:9d]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 04:52:24.374  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:52:24.377 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:52:24.380 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-10 04:52:24.388 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:52:24.389  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-10 04:52:24.390  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:52:24.391  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:52:24.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:52:24.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:52:24.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:52:24.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:52:24.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:52:24.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:52:24.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:52:24.687  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:52:24.687  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:52:24.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:52:24.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:52:24.691  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:52:24.691  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:52:24.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:52:24.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:52:24.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:52:24.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:52:24.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:52:24.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:52:24.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:52:24.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:52:24.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:52:24.697 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:52:24.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: abc76517afa7dd2b1df1a671680864e9da4f5e4926fefa71da85a784ee804b8d046869a3b8213f1361e2876317a10b67ba2a6129f6fe7ba2a0c612312084f2568fb42622064d0a7c1bc1ab59a0331b72a005e1e44aadb1e518485cab9a8b254edf0d88ab391e678b74615b093e4400f32a490e4d5b264d6d2923d6391cfeb7fa332815402f6213af368f2785b9836dbe2aaa6f6b5f4ae407d74d2587209a3e158c4c8816c903300dacdb9dfaf9c54341a11243b210908447d895d9ea6c9f8e8fd4c597435a39e220b8447dd88491af274b599ffba20bbaadfcfe833108580cff1a3ef4e31d77e79c353128bc09afa984fa247f18cefe9131f835f1db5ed29315281af0019c87ce699e8ee89ef4021aa1047309a2c0dc0dea9c9b8d8f315eeff45ac83af6f1d7e46bb26865fc2a87d604b208777f188edbcec166e3a94fbef2e03721b38cf8bc43e7cdb1f8dcf88b78d8627a1fa68777d26407d4d1a2974e59a4c10387bfb88bd3ff0f58887b80411eeaf499313ab4937cfeb9d29f8df7371b41
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:ef:4b:17:3f:5f:93:13:8d:a2:28:f5:1a:ea:b6:7b:80:74:9f:1c]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 04:54:18.052  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:54:18.054 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:54:18.056 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-10 04:54:18.057 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:54:18.058  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-10 04:54:18.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:54:18.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:54:18.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:54:18.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:54:18.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:54:18.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:54:18.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:54:18.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:54:18.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:54:18.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:54:18.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:54:18.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:54:18.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:54:18.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:54:18.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:54:18.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:54:18.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:54:18.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:54:18.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:54:18.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:54:18.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:54:18.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:54:18.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:54:18.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:54:18.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:54:18.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:24:68:17:7b:3f:65:ce:6f:bb:d9:3e:9c:bb:7e:da:28:48:63:38]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 04:57:14.160  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:57:14.162 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:57:14.163 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-10 04:57:14.164 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:57:14.187  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-10 04:57:14.189  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:57:14.189  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:57:14.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:57:14.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:57:14.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:57:14.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:57:14.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:57:14.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:57:14.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:57:14.384  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:57:14.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:57:14.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:57:14.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:57:14.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:57:14.390  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:57:14.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:14.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:14.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:14.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:14.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:14.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:14.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:14.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:14.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:14.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:57:14.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:e4:24:42:54:00:fa:a8:30:b0:4b:9f:ff:84:98:11:e6:83:63:05]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 04:57:28.919  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:57:28.921 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:57:28.923 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-10 04:57:28.924 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:57:28.925  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-10 04:57:28.925  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:57:28.926  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:57:28.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:57:28.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:57:28.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:57:28.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:57:28.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:57:28.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:57:28.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:57:29.098  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:57:29.099  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:57:29.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:57:29.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:57:29.103  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:57:29.103  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:57:29.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:29.104 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:29.104 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:29.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:29.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:29.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:29.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:29.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:29.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:29.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:57:29.112 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:5b:58:5c:d0:b3:0e:3a:d9:a7:92:ce:59:dc:73:da:4b:e5:69:3e]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 04:57:45.705  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:57:45.706 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:57:45.708 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-10 04:57:45.709 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:57:45.709  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-10 04:57:45.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:57:45.711  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:57:45.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:57:45.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:57:45.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:57:45.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:57:45.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:57:45.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:57:45.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:57:45.870  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:57:45.871  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:57:45.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:57:45.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:57:45.890  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:57:45.891  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:57:45.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:45.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:45.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:45.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:45.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:45.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:45.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:57:45.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:57:45.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:57:45.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:57:45.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:03:4f:8b:18:60:54:c1:a8:08:25:be:c8:7e:cb:0b:c3:4c:88:83]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 04:58:20.757  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:58:20.759 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:58:20.760 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-10 04:58:20.761 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:58:20.762  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-10 04:58:20.762  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:58:20.762  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:58:20.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:58:20.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:58:20.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:58:20.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:58:20.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:58:20.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:58:20.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:58:20.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:58:20.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:58:20.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:58:20.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:58:20.901  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:58:20.901  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:58:20.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:58:20.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:58:20.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:58:20.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:58:20.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:58:20.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:58:20.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:58:20.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:58:20.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:58:20.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:58:20.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:2b:8b:9f:92:4c:56:59:92:8e:aa:91:f1:b6:5c:58:dc:cd:80:f3]
            modulus: d4db7f3e6c94b8271dfdfb996effaf9bd2e644166748743c9f7b721d3ad2c739ce6e5c62c99f59d927297055dbe9e76784022164e3cab99911f24277342ab49704b8b052b88c37a03ea0be0c163c77534e408898b3a69151a641a9d6839e340d6e113c0db2f6df7aec54f6ebe204d9a0fd647287c20f6f7d924ba14c2e5e19e56bfa3f874c8c7fcb633771ce34f165ddd9cf8e7ed7cc6a8f304e14aedb8f7ac3de5491fdf17b89361c5ac6881550e8e59e922d5b3a4eec01a9fc6a1b10fc1fd56a68f9d609bada5f28a46bce984e9dcd6d174e9fd3bc5f6096de24ef4657040e0eca72ab9677ac70ee28956babf349049e0f7168be483a1409aa092f826a0f37
    public exponent: 10001

] 
2021-10-10 04:59:41.875  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 04:59:41.876 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 04:59:41.888 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-10 04:59:41.889 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 04:59:41.889  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-10 04:59:41.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 04:59:41.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 04:59:41.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 04:59:41.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 04:59:41.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 04:59:41.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 04:59:41.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:59:41.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 04:59:41.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:59:42.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 04:59:42.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 04:59:42.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 04:59:42.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 04:59:42.005  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 04:59:42.005  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 04:59:42.005 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:59:42.006 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:59:42.006 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:59:42.007 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:59:42.007 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:59:42.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:59:42.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 04:59:42.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 04:59:42.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 04:59:42.011 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 04:59:42.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:cf:f0:d6:2a:f7:5f:95:24:dd:f3:bc:27:61:1e:3b:08:40:fa:16]
            modulus: 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
    public exponent: 10001

] 
2021-10-10 05:00:25.396  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-10 05:00:25.397 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-10 05:00:25.398 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-10 05:00:25.399 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-10 05:00:25.399  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-10 05:00:25.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-10 05:00:25.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-10 05:00:25.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-10 05:00:25.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-10 05:00:25.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-10 05:00:25.406 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-10 05:00:25.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 05:00:25.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-10 05:00:25.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 05:00:25.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-10 05:00:25.504  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-10 05:00:25.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-10 05:00:25.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-10 05:00:25.506  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-10 05:00:25.507  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-10 05:00:25.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 05:00:25.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 05:00:25.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 05:00:25.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 05:00:25.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 05:00:25.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 05:00:25.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-10 05:00:25.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-10 05:00:25.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-10 05:00:25.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-10 05:00:25.514 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 520269055619073188917422170167108002635187022590
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 10 01:41:38 UTC 2021
           Final Date: Fri Oct 10 01:41:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9
                       d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4
                       7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58
                       640fab135c161ec1d930b0c5c7c17fbdcb8b80a3
                       d4117cc644fb0674f90679fa51511678ca1e7d10
                       6e23022a808d996c67cb0965d693e9d2fe13ca30
                       81e73a302291e4124fb9bd69497d8da5d7f639f7
                       9938bd03f659f57d22b617ce5762fa09fe3cd180
                       696139e233b1d7e67dae33191122f3aa4c48d7a7
                       28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8
                       35e453a01e46f3e026c5a73ab0b5321c97c1957f
                       847a748498c54109c753650a068212616f6d7d48
                       0918c8a8a8ea92f0ce98956b4c799bcf1c061b82
                       db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194
                       4197a1e11c530594851008eb6459c1f56acdd8ef
                       07ab1a892de73e0c6b65a652d9d4165df359b229
                       5b8840813248914eabd9f1a30a1f6a134ce0d407
                       7c11af8f2a1d78cc11803da39bf286998e3887c1
                       81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482
                       73e0f0a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:ff:e2:c9:28:2b:73:6f:b7:83:25:8e:56:19:84:60:64:ee:ed:8b]
            modulus: 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
    public exponent: 10001

]