Results

By type

          2021-10-11 09:22:51,240 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-11 09:22:55,055 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-11 09:22:58.047  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-11 09:23:10.054 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-11 09:23:11.638  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-11 09:23:12.243  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-11 09:23:23.550  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.479 seconds (JVM running for 41.129)
2021-10-11 09:24:58.142  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 09:24:58.151 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 09:24:58.267 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-11 09:24:58.340 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 09:24:58.438  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-11 09:24:58.442  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 09:24:58.443  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 09:24:58.445 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 09:24:58.446 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 09:24:58.450 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 09:24:58.540 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 09:24:58.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 09:24:58.649 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 09:24:58.654 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 09:24:58.655 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 09:24:58.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 09:25:00.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 09:25:00.137  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 09:25:00.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 09:25:00.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 09:25:00.149  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 09:25:00.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 09:25:00.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 09:25:00.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 09:25:00.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 09:25:00.249 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 09:25:00.249 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 09:25:00.250 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 09:25:00.255 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 09:25:00.256 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 09:25:00.256 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 09:25:00.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 09:25:00.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: a770e1e9c56daa035c7bfc33ca6dd23b33e8adb91e369b319eb36b35a09eb8071a98c21412baabd18a68adae1fa6cbd337fc0cc7a9fa298d4c9b1e119e8841ea823e3b082c947faa2d7562701d105c98d3e86dc57fc193d202187a6c622e4fa0268d764d5fdf3be3d996aa4e5861b2ed8ecc890e3c2304ec7df35602f2383e26e072dfabce20a57de55db2d9bb6c6c2ce895fba90d37890808a4db28d68348d4d66624deb7c1b578e56b952c87e524a00eedd85d737bd7d9067c453f14596f63c77370578d1c39681e8b4aa05e92f67028055afb8a041814862fd45e72b31bbd8934470c246e206718b858d6f7d02a7e188461dc5978dce28f797b80703129134b5ac518914eb923ca5e14f129589c502904f74593aef5ee365cf03aa417455ee0fc72bf578d2361b32a9c87b941028c6efa6acee7ab38ef6303a6d8bce99b0ce402a9c2aa57ea1d229d3b875ee00b4e1591ba58b73e96b159e0c66b332092000412ca805733616346264fd4e1ea7af09d98a6df8f4ceb3174cda6d67aee56b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:a9:c6:84:c1:34:e9:60:0a:e0:61:d1:f6:a4:82:6f:3a:c5:79:6d]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 11:50:11.847  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:50:11.850 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:50:11.852 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-11 11:50:11.853 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:50:11.854  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-11 11:50:11.855  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:50:11.856  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:50:11.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:50:11.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:50:11.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:50:11.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:50:11.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:50:11.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:50:11.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:50:12.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:50:12.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:50:12.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:50:12.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:50:12.150  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:50:12.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:50:12.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:50:12.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:50:12.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:50:12.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:50:12.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:50:12.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:50:12.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:50:12.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:50:12.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:50:12.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:50:12.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: a770e1e9c56daa035c7bfc33ca6dd23b33e8adb91e369b319eb36b35a09eb8071a98c21412baabd18a68adae1fa6cbd337fc0cc7a9fa298d4c9b1e119e8841ea823e3b082c947faa2d7562701d105c98d3e86dc57fc193d202187a6c622e4fa0268d764d5fdf3be3d996aa4e5861b2ed8ecc890e3c2304ec7df35602f2383e26e072dfabce20a57de55db2d9bb6c6c2ce895fba90d37890808a4db28d68348d4d66624deb7c1b578e56b952c87e524a00eedd85d737bd7d9067c453f14596f63c77370578d1c39681e8b4aa05e92f67028055afb8a041814862fd45e72b31bbd8934470c246e206718b858d6f7d02a7e188461dc5978dce28f797b80703129134b5ac518914eb923ca5e14f129589c502904f74593aef5ee365cf03aa417455ee0fc72bf578d2361b32a9c87b941028c6efa6acee7ab38ef6303a6d8bce99b0ce402a9c2aa57ea1d229d3b875ee00b4e1591ba58b73e96b159e0c66b332092000412ca805733616346264fd4e1ea7af09d98a6df8f4ceb3174cda6d67aee56b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:de:7b:c3:61:d0:bc:ee:79:90:6d:13:c3:b7:6b:c6:19:fe:68:0e]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 11:53:09.323  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:53:09.324 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:53:09.325 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 11:53:09.326 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:53:09.327  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 11:53:09.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:53:09.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:53:09.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:53:09.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:53:09.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:53:09.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:53:09.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:53:09.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:53:09.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:53:09.445  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:53:09.446  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:53:09.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:53:09.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:53:09.448  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:53:09.449  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:53:09.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:53:09.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:53:09.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:53:09.451 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:53:09.451 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:53:09.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:53:09.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:53:09.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:53:09.453 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:53:09.454 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:53:09.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: a770e1e9c56daa035c7bfc33ca6dd23b33e8adb91e369b319eb36b35a09eb8071a98c21412baabd18a68adae1fa6cbd337fc0cc7a9fa298d4c9b1e119e8841ea823e3b082c947faa2d7562701d105c98d3e86dc57fc193d202187a6c622e4fa0268d764d5fdf3be3d996aa4e5861b2ed8ecc890e3c2304ec7df35602f2383e26e072dfabce20a57de55db2d9bb6c6c2ce895fba90d37890808a4db28d68348d4d66624deb7c1b578e56b952c87e524a00eedd85d737bd7d9067c453f14596f63c77370578d1c39681e8b4aa05e92f67028055afb8a041814862fd45e72b31bbd8934470c246e206718b858d6f7d02a7e188461dc5978dce28f797b80703129134b5ac518914eb923ca5e14f129589c502904f74593aef5ee365cf03aa417455ee0fc72bf578d2361b32a9c87b941028c6efa6acee7ab38ef6303a6d8bce99b0ce402a9c2aa57ea1d229d3b875ee00b4e1591ba58b73e96b159e0c66b332092000412ca805733616346264fd4e1ea7af09d98a6df8f4ceb3174cda6d67aee56b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:88:90:95:70:60:cb:a8:ba:62:3a:07:b1:15:c4:ea:cd:9f:d7:83]
            modulus: bc8eacbaf621e8b39a83e3059dbbf67ab4ba571552a1ab5ebcc46407485ba8ccec2b8d2adf1b230a46fa701e9c2c02efa9dda583cb0aad39fd8327881c1a76f1451122fb30f947828562857c05e69f1e128bf7f7f9c06bf402b69a6a4413ff4fc5f83a548974cc5b3fb69f16cd58ac9dc5243e09bbacd499b902d1108656cc86d4686e36bd02d427885ba056b9fc9794997ccbc01faa547c3b0c1807335df73f919c0848d126325198b950d31a3cca3ac913ce3e578d6115dcaaa21ff5fde75f6ee84620aa10ca40db486bb05e3cf22ec34172c76f8d46e03ed7c1e50247c4aa8adedd69213df11f70ee840e3dabddac0540b354606547e1ce9206ff090e8965
    public exponent: 10001

] 
2021-10-11 11:55:04.583  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:55:04.584 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:55:04.586 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 11:55:04.586 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:55:04.587  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 11:55:04.587  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:55:04.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:55:04.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:55:04.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:55:04.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:55:04.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:55:04.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:55:04.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:55:04.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:55:04.736  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:55:04.737  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:55:04.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:55:04.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:55:04.739  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:55:04.740  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:55:04.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:55:04.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:55:04.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:55:04.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:55:04.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:55:04.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:55:04.743 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:55:04.743 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:55:04.743 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:55:04.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:55:04.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:bf:04:3e:60:47:f3:ec:2d:29:33:4b:2b:22:f3:25:be:83:f2:45]
            modulus: ba0a6e79f6435f1e92a79c644624a96450c7fb13375d1adf87e296ac9c4fb7c36f3ab2437d5a927c27051bb09694f0e7448f6d9624e7e6fcd68aa563c006a95039fde91a35a28931f5007aa1864e04ba520d52694df09b14791711dd757390cdd80273ccb63ec3359b00a2a85b004226fdb3214340daa22cd7239cb2ed3c3f263d1018f6ae590de6fcaf9d881258121a2ecccca484e42697e6855ccc9258a121ba3414ba010e6d45876f7c7601ed8fcfd8994a3e465fbfcf89221a9dece94bc01255dbfaf1d1ce9433b5a74f8087c9a525d886b375f4b0e83f96fd529cf6fb13f1e52028f191ea02573083015f025f7e1e49c3fbb6b72468fb46e0ba64d71a83
    public exponent: 10001

] 
2021-10-11 11:55:37.786  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:55:37.787 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:55:37.788 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-11 11:55:37.788 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:55:37.789  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-11 11:55:37.789  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:55:37.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:55:37.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:55:37.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:55:37.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:55:37.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:55:37.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:55:37.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:55:37.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:55:37.925  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:55:37.937  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:55:37.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:55:37.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:55:37.939  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:55:37.940  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:55:37.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:55:37.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:55:37.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:55:37.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:55:37.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:55:37.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:55:37.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:55:37.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:55:37.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:55:37.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:55:37.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:d2:4a:1d:25:e0:c2:4f:6d:65:8e:0b:7e:5c:b0:8e:2f:9e:c2:36]
            modulus: d52a15fb3d3d8e000c0711cbe694ac2b10f67173b8428901a3fb92d90f76478c53b18f636ffe249f8becf783cac45e53ff415b912bbcd832d6d677fd39ef16e0710373be41fd6a2d12338f5e9c74b29a0a5acd38ac307b1aec608237f6fe15df05604756eb52313fd371e15c108fc655104021b89fc983d747779d328a26813bba8f43cab3b589613e71d0b1e9a3491e2c91fe619fbad2f969594194dea9a4adb6d036ed6e40cbdfffed12d56daf9c34031f29ed4a0dfa53cbde8dcf3546264d7ec7ed5b9c2da5613441e44ceb91967cb2650ed004fffb2f07855ed08e4f5bacb69f41f7b26f116bf35b9f419ce5f5a0098beebac273c9be863e4679e998a771
    public exponent: 10001

] 
2021-10-11 11:56:11.527  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:56:11.528 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:56:11.529 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-11 11:56:11.530 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:56:11.530  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-11 11:56:11.531  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:56:11.531  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:56:11.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:56:11.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:56:11.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:56:11.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:56:11.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:56:11.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:56:11.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:56:11.660  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:56:11.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:56:11.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:56:11.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:56:11.664  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:56:11.665  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:56:11.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:56:11.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:56:11.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:56:11.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:56:11.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:56:11.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:56:11.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:56:11.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:56:11.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:56:11.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:56:11.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: a770e1e9c56daa035c7bfc33ca6dd23b33e8adb91e369b319eb36b35a09eb8071a98c21412baabd18a68adae1fa6cbd337fc0cc7a9fa298d4c9b1e119e8841ea823e3b082c947faa2d7562701d105c98d3e86dc57fc193d202187a6c622e4fa0268d764d5fdf3be3d996aa4e5861b2ed8ecc890e3c2304ec7df35602f2383e26e072dfabce20a57de55db2d9bb6c6c2ce895fba90d37890808a4db28d68348d4d66624deb7c1b578e56b952c87e524a00eedd85d737bd7d9067c453f14596f63c77370578d1c39681e8b4aa05e92f67028055afb8a041814862fd45e72b31bbd8934470c246e206718b858d6f7d02a7e188461dc5978dce28f797b80703129134b5ac518914eb923ca5e14f129589c502904f74593aef5ee365cf03aa417455ee0fc72bf578d2361b32a9c87b941028c6efa6acee7ab38ef6303a6d8bce99b0ce402a9c2aa57ea1d229d3b875ee00b4e1591ba58b73e96b159e0c66b332092000412ca805733616346264fd4e1ea7af09d98a6df8f4ceb3174cda6d67aee56b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:80:80:5a:3d:89:90:cd:01:66:29:5b:c1:f3:08:17:df:cb:4e:c5]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 11:57:00.249  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:57:00.250 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:57:00.251 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 11:57:00.252 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:57:00.252  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 11:57:00.253  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:57:00.253  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:57:00.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:57:00.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:57:00.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:57:00.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:57:00.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:57:00.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:57:00.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:57:00.436  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:57:00.437  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:57:00.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:57:00.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:57:00.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:57:00.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:57:00.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:57:00.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:57:00.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:57:00.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:57:00.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:57:00.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:57:00.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:57:00.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:57:00.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:57:00.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:57:00.448 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: a770e1e9c56daa035c7bfc33ca6dd23b33e8adb91e369b319eb36b35a09eb8071a98c21412baabd18a68adae1fa6cbd337fc0cc7a9fa298d4c9b1e119e8841ea823e3b082c947faa2d7562701d105c98d3e86dc57fc193d202187a6c622e4fa0268d764d5fdf3be3d996aa4e5861b2ed8ecc890e3c2304ec7df35602f2383e26e072dfabce20a57de55db2d9bb6c6c2ce895fba90d37890808a4db28d68348d4d66624deb7c1b578e56b952c87e524a00eedd85d737bd7d9067c453f14596f63c77370578d1c39681e8b4aa05e92f67028055afb8a041814862fd45e72b31bbd8934470c246e206718b858d6f7d02a7e188461dc5978dce28f797b80703129134b5ac518914eb923ca5e14f129589c502904f74593aef5ee365cf03aa417455ee0fc72bf578d2361b32a9c87b941028c6efa6acee7ab38ef6303a6d8bce99b0ce402a9c2aa57ea1d229d3b875ee00b4e1591ba58b73e96b159e0c66b332092000412ca805733616346264fd4e1ea7af09d98a6df8f4ceb3174cda6d67aee56b5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:50:82:05:8e:15:2f:25:a4:d6:5d:4d:c1:09:23:81:aa:93:8b:be]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 11:58:57.329  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:58:57.330 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:58:57.332 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 11:58:57.332 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:58:57.333  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 11:58:57.333  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:58:57.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:58:57.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:58:57.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:58:57.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:58:57.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:58:57.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:58:57.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:58:57.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:58:57.444  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:58:57.445  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:58:57.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:58:57.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:58:57.448  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:58:57.448  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:58:57.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:58:57.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:58:57.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:58:57.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:58:57.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:58:57.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:58:57.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:58:57.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:58:57.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:58:57.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:58:57.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:57:37:7c:10:63:3f:3f:71:0a:3f:2e:ad:89:32:70:ec:dc:e2:0f]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 11:59:55.435  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 11:59:55.436 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 11:59:55.437 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 11:59:55.438 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 11:59:55.438  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 11:59:55.439  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 11:59:55.439  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 11:59:55.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 11:59:55.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 11:59:55.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 11:59:55.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 11:59:55.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:59:55.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 11:59:55.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:59:55.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 11:59:55.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 11:59:55.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 11:59:55.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 11:59:55.556  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 11:59:55.556  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 11:59:55.556 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:59:55.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:59:55.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:59:55.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:59:55.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:59:55.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:59:55.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 11:59:55.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 11:59:55.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 11:59:55.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 11:59:55.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 497192858982649874840575802223697003300158120973
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 11 09:18:59 UTC 2021
           Final Date: Sat Oct 11 09:18:58 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:bc:a4:73:15:09:2b:f4:2e:17:17:b9:f9:a7:b8:e9:32:fe:83:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0bbefae11f906f0b509304b623aec4937fba43b9
                       1e4cb4d1ec6c19c22251fa2437efb95d486b0da8
                       656f685f8cef21fedae54683d6cc10e7f28c8069
                       447f54b071051017fee6a2b794f953cf96032717
                       a2c717459f4991f4688c67a51c2c300bdcf3c714
                       cddcde17890ba96d5ed2789eb2468a9971108dc5
                       8c0b89eb0f07bc67ea14f8d25fd2865998342869
                       17e0eb05be358f3d463aff32d906774fdb7411de
                       5f565c0e27d583489d9df9b85fe3654acee56234
                       813176e3cbf4d21e1c3df974189e66ca1be0a6b3
                       cdd026d900f754def867f8a3232b5b228303eaf7
                       102cd53945ef1cffae9ea4cf2c45a5e52581a1ec
                       7a88b52d8fc0897483493520f2f8a22c7bdfcec5
                       25e32c32735a4254c06e1ea0364b8e254c09248f
                       5d67cb7adfaa7b50fdc698848b4eeca286b88cc7
                       e81b6081d4cbc8ac75982677f6ce8e56212d56f8
                       35b7e1fde356ee5b46d28481f02427c86249fb47
                       b9f358ac2f0c3256089217e4478be9135c593ce8
                       494d7b3b2ffb6804d96000d7ef743dc5a9988fb1
                       1881d802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:43:94:8c:e5:08:de:bc:de:78:4e:b6:0b:c2:fb:30:56:9a:f3:9e]
            modulus: a9f2efb4eb96219b9769ff26487e4329288ba682a5d3fcb9833801ce444f04f980ad2f209f9c1a903e7f8f2918d96de73d873f8873be3d2d64fe8b8ab5d2e76d61f82ce37b433e66df03cd89c1b218bb5ed42f997504f20748a6a7c8ce4a8f198d2505e369829a549349f79c07e1103210f915f58de5f60fbe7185b412376aa6e9b1e31453443c97742c2538c54a2338588ed5e1af2a2a219b56f0733b0497cb756add640b215ea1b60a2d1865ea0ce7bddc675fc8f912d92e3b31a9b9a8d440006f6fa72ada5cb9bfadcc9877d33bfeb9712af5c69f09ed10b25a40f56e5bbfc898f199d9a982c0e12566d42ea94621088e3485c4fb5407378cf681e89e9647
    public exponent: 10001

]