Results

By type

          2021-10-13 02:17:25,302 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-13 02:17:29,702 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-13 02:17:32.915  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-13 02:17:47.301 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-13 02:17:48.297  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-13 02:17:48.912  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-13 02:18:01.007  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.105 seconds (JVM running for 46.0)
2021-10-13 02:18:31.197  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 02:18:31.208 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 02:18:31.400 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-13 02:18:31.405 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 02:18:31.505  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-13 02:18:31.591  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 02:18:31.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 02:18:31.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 02:18:31.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 02:18:31.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 02:18:31.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 02:18:31.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 02:18:31.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 02:18:31.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 02:18:31.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 02:18:31.903 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 02:18:33.918  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 02:18:33.921  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 02:18:33.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 02:18:33.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 02:18:34.001  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 02:18:34.002  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 02:18:34.003 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 02:18:34.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 02:18:34.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 02:18:34.096 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 02:18:34.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 02:18:34.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 02:18:34.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 02:18:34.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 02:18:34.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 02:18:34.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 02:18:34.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:7c:85:f8:28:5d:33:16:ad:3b:a3:72:ed:1e:13:40:bb:41:ca:e6]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:22:30.014  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:22:30.015 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:22:30.018 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-13 06:22:30.019 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:22:30.019  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-13 06:22:30.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:22:30.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:22:30.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:22:30.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:22:30.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:22:30.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:22:30.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:22:30.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:22:30.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:22:30.637  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:22:30.638  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:22:30.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:22:30.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:22:30.644  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:22:30.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:22:30.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:22:30.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:22:30.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:22:30.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:22:30.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:22:30.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:22:30.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:22:30.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:22:30.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:22:30.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:22:30.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:f8:59:42:0e:4d:b4:0d:4f:a5:71:f7:67:2b:c7:d0:ff:12:d4:a4]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:24:25.648  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:24:25.650 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:24:25.651 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-13 06:24:25.653 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:24:25.655  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-13 06:24:25.656  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:24:25.692  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:24:25.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:24:25.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:24:25.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:24:25.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:24:25.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:24:25.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:24:25.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:24:25.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:24:25.905  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:24:25.906 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:24:25.906 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:24:25.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:24:25.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:24:25.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:24:25.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:24:25.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:24:25.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:24:25.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:24:25.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:24:25.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:24:25.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:24:25.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:24:25.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:24:26.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:45:e0:cc:a7:c4:e5:09:77:d4:47:ce:0d:ad:92:3c:fa:16:d2:2f]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:27:30.107  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:27:30.108 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:27:30.110 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-13 06:27:30.111 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:27:30.111  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-13 06:27:30.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:27:30.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:27:30.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:27:30.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:27:30.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:27:30.118 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:27:30.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:27:30.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:27:30.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:27:30.298  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:27:30.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:27:30.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:27:30.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:27:30.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:27:30.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:27:30.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:27:30.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:27:30.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:27:30.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:27:30.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:27:30.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:27:30.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:27:30.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:27:30.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:27:30.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:27:30.312 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: d5ab51b2a826eca0c13b6060b6008d5390ce4defbb8778ef53e2c43f976f99315f85455e2128673af06f0fc696ace575a0afeda6b2688fd76753ed0b4c0775763e336c732c07431ea8c70b8d046ca2fb1b68375111a726f90a84e31bfbf4ed9be017ac06d9c277d99e35b779b477c4c05b5b086abc6d8c1530fc042086a8d03c94430e48e652c2a92035325ff413d044617e7f950059259088f0c64e784b6da1558df0607aef64a857a753646fd1c9f2c4eb5139b4763074e7e5039ded27bf1fd41b70159e967785e64862744dbd690cabc5b3ba68a3c542d9615c7481b5e922cb2e70edd0034ff0e5168efbe81f7c12b0c7db66fc57b792a708dd1bf8cb3ac34af7d697b278ceac332bf0ce8fde2130ed3a1d8b414c919a57de1d9e8211a853faf2bcb52950679d6a381a7365c3ef8130e27ac26309e7fee4ce85039953021ac71f8bdaedebd32f141cc41407de57e47017a5637d1bfe97e8dae1f3f2656b0152dcb43f06896bf60b7be297d323e41fa899e870ca4bdab34e5e874d422fbf2d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:78:ea:88:48:c7:19:8d:a2:82:6c:fb:46:5f:2d:54:a3:6a:a6:97]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:28:02.263  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:28:02.264 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:28:02.265 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-13 06:28:02.266 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:28:02.266  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-13 06:28:02.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:28:02.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:28:02.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:28:02.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:28:02.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:28:02.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:28:02.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:28:02.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:28:02.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:28:02.427  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:28:02.428  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:28:02.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:28:02.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:28:02.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:28:02.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:28:02.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:02.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:02.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:02.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:02.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:02.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:02.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:02.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:02.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:02.436 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:28:02.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: d5ab51b2a826eca0c13b6060b6008d5390ce4defbb8778ef53e2c43f976f99315f85455e2128673af06f0fc696ace575a0afeda6b2688fd76753ed0b4c0775763e336c732c07431ea8c70b8d046ca2fb1b68375111a726f90a84e31bfbf4ed9be017ac06d9c277d99e35b779b477c4c05b5b086abc6d8c1530fc042086a8d03c94430e48e652c2a92035325ff413d044617e7f950059259088f0c64e784b6da1558df0607aef64a857a753646fd1c9f2c4eb5139b4763074e7e5039ded27bf1fd41b70159e967785e64862744dbd690cabc5b3ba68a3c542d9615c7481b5e922cb2e70edd0034ff0e5168efbe81f7c12b0c7db66fc57b792a708dd1bf8cb3ac34af7d697b278ceac332bf0ce8fde2130ed3a1d8b414c919a57de1d9e8211a853faf2bcb52950679d6a381a7365c3ef8130e27ac26309e7fee4ce85039953021ac71f8bdaedebd32f141cc41407de57e47017a5637d1bfe97e8dae1f3f2656b0152dcb43f06896bf60b7be297d323e41fa899e870ca4bdab34e5e874d422fbf2d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:1b:58:09:c0:d5:b9:c1:51:76:0e:2b:ff:64:7e:11:1a:ec:95:25]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:28:18.330  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:28:18.331 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:28:18.333 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-13 06:28:18.334 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:28:18.334  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-13 06:28:18.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:28:18.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:28:18.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:28:18.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:28:18.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:28:18.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:28:18.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:28:18.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:28:18.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:28:18.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:28:18.491  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:28:18.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:28:18.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:28:18.494  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:28:18.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:28:18.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:18.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:18.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:18.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:18.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:18.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:18.499 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:18.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:18.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:18.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:28:18.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: d5ab51b2a826eca0c13b6060b6008d5390ce4defbb8778ef53e2c43f976f99315f85455e2128673af06f0fc696ace575a0afeda6b2688fd76753ed0b4c0775763e336c732c07431ea8c70b8d046ca2fb1b68375111a726f90a84e31bfbf4ed9be017ac06d9c277d99e35b779b477c4c05b5b086abc6d8c1530fc042086a8d03c94430e48e652c2a92035325ff413d044617e7f950059259088f0c64e784b6da1558df0607aef64a857a753646fd1c9f2c4eb5139b4763074e7e5039ded27bf1fd41b70159e967785e64862744dbd690cabc5b3ba68a3c542d9615c7481b5e922cb2e70edd0034ff0e5168efbe81f7c12b0c7db66fc57b792a708dd1bf8cb3ac34af7d697b278ceac332bf0ce8fde2130ed3a1d8b414c919a57de1d9e8211a853faf2bcb52950679d6a381a7365c3ef8130e27ac26309e7fee4ce85039953021ac71f8bdaedebd32f141cc41407de57e47017a5637d1bfe97e8dae1f3f2656b0152dcb43f06896bf60b7be297d323e41fa899e870ca4bdab34e5e874d422fbf2d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:5d:85:c6:b2:43:d5:35:76:6f:02:df:dd:23:e6:8f:1d:cb:3f:46]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:28:35.332  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:28:35.334 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:28:35.335 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-13 06:28:35.335 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:28:35.336  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-13 06:28:35.336  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:28:35.337  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:28:35.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:28:35.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:28:35.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:28:35.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:28:35.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:28:35.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:28:35.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:28:35.502  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:28:35.502  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:28:35.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:28:35.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:28:35.506  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:28:35.506  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:28:35.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:35.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:35.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:35.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:35.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:35.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:35.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:28:35.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:28:35.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:28:35.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:28:35.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:48:8a:ea:fe:5e:07:ac:af:62:e2:b6:d0:c1:06:69:f9:ff:f0:50]
            modulus: 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
    public exponent: 10001

] 
2021-10-13 06:30:13.948  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:30:13.949 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:30:13.951 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-13 06:30:13.951 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:30:13.952  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-13 06:30:13.952  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:30:13.953  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:30:13.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:30:13.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:30:13.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:30:13.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:30:13.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:30:13.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:30:13.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:30:14.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:30:14.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:30:14.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:30:14.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:30:14.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:30:14.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:30:14.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:30:14.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:30:14.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:30:14.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:30:14.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:30:14.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:30:14.133 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:30:14.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:30:14.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:30:14.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:30:14.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: d5ab51b2a826eca0c13b6060b6008d5390ce4defbb8778ef53e2c43f976f99315f85455e2128673af06f0fc696ace575a0afeda6b2688fd76753ed0b4c0775763e336c732c07431ea8c70b8d046ca2fb1b68375111a726f90a84e31bfbf4ed9be017ac06d9c277d99e35b779b477c4c05b5b086abc6d8c1530fc042086a8d03c94430e48e652c2a92035325ff413d044617e7f950059259088f0c64e784b6da1558df0607aef64a857a753646fd1c9f2c4eb5139b4763074e7e5039ded27bf1fd41b70159e967785e64862744dbd690cabc5b3ba68a3c542d9615c7481b5e922cb2e70edd0034ff0e5168efbe81f7c12b0c7db66fc57b792a708dd1bf8cb3ac34af7d697b278ceac332bf0ce8fde2130ed3a1d8b414c919a57de1d9e8211a853faf2bcb52950679d6a381a7365c3ef8130e27ac26309e7fee4ce85039953021ac71f8bdaedebd32f141cc41407de57e47017a5637d1bfe97e8dae1f3f2656b0152dcb43f06896bf60b7be297d323e41fa899e870ca4bdab34e5e874d422fbf2d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:60:e2:b9:98:4a:4b:5f:4c:e6:61:71:5d:ca:ff:fc:33:c4:d1:50]
            modulus: c31f2e948d97e904ad0e19ed9af865d32570ae1c78ff63859e7bfe5145dcc2f62479a7b6525e589ec8727d9adf4bb601dd5f7341659fdf3e93a7841564b099fe2294727abe98f0a547bc67d1ed5fc75373f9227f6d1fd464c5453dd94bdd098131e07344801dd5ef6e6cb6bd2e84a9f85e72501ce80a032b06c4c5f54df330496984de5592421753c1a2b7ecdceb756b54435b4c685ca9694b131e87c4e1b9096e9157776254aac0bcd73bfd2a462282f11c3a20ad3461ca050eb635f0df7370b6d4dfd5f3be119acead53a3b8b3236c18bba6ff90b835f038de0eeb2bec5d8ed7abff32fd9b430029a199c71d17dcb01358b59d5df3961ebb34b32cb5e05025
    public exponent: 10001

] 
2021-10-13 06:30:21.302  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-13 06:30:21.303 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-13 06:30:21.305 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-13 06:30:21.305 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-13 06:30:21.306  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-13 06:30:21.306  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-13 06:30:21.306  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-13 06:30:21.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-13 06:30:21.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-13 06:30:21.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-13 06:30:21.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-13 06:30:21.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:30:21.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-13 06:30:21.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:30:21.389  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-13 06:30:21.389  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-13 06:30:21.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-13 06:30:21.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-13 06:30:21.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-13 06:30:21.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-13 06:30:21.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:30:21.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:30:21.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:30:21.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:30:21.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:30:21.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:30:21.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-13 06:30:21.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-13 06:30:21.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-13 06:30:21.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-13 06:30:21.399 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 548844472390754782545287408964125051981816457544
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Oct 13 02:11:03 UTC 2021
           Final Date: Mon Oct 13 02:11:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a6:99:8d:35:e8:c7:4a:68:89:04:4d:d1:dc:fb:a0:47:87:5c:be:9d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9fbb9d13282571a39e75b3bfc05b0ba76a3bf9a6
                       4c3a3974090cc7691f2a3cb59a28adeb9c3999c8
                       a0a7cb53a463f2919e2566f5bf4cbabeab491f48
                       d7d6b3a767c6432b45a76b5a6ec1a37b3244b96c
                       1182a30b8cc1d8e1fecc311407192c5097277ad7
                       ccf5061d8c2d2c084da97545f7ce5743c52d8c38
                       12680bf46eac144ea3af058e15f65affa886b2b8
                       8a3cccb931f80a5e5ddabfd1834e3b4668c4c3ad
                       83e259d4d9a058b6c5454cb75d77f2cb7c3c750d
                       8feee241dbcee8aa80cbb0e5eaa1a1e3b53ab09e
                       982d68c37740f8329bf0d29ddd72ac31e0b99aa7
                       b2cd850faf57cadbadcd0bf983f2f6090d343cdf
                       3dae38bd0048d7912c299a5f6cfa746b1cd07256
                       00d1d8abf8c50bd315ba012fd1701756a95ccf1f
                       c6089ef63d7474d6c149decd6eba3952a476b7d5
                       e3a73e83cfa0f5a3f6cf83e33ef67b5d1a3c1f76
                       89f4f086e7ef6f1a3bb699d6d899d4a51599400c
                       068cb7d3706369762c7bbfc7dfc7225cbef4f4d5
                       fb8110a3e46241ef6746c355b03bc32249778512
                       cf38b29a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:38:b1:ba:e2:ed:91:36:9b:80:ab:72:33:a1:09:b1:d0:82:16:3c]
            modulus: 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
    public exponent: 10001

]