Results

By type

          2021-10-26 02:02:17,158 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-26 02:02:21,761 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-26 02:02:25.080  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-26 02:02:40.078 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-26 02:02:41.473  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-26 02:02:42.266  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-26 02:02:54.860  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.295 seconds (JVM running for 48.615)
2021-10-26 02:03:37.161  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 02:03:37.170 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 02:03:37.362 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-26 02:03:37.365 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 02:03:37.469  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-26 02:03:37.474  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 02:03:37.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 02:03:37.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 02:03:37.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 02:03:37.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 02:03:37.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 02:03:37.661 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 02:03:37.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 02:03:37.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 02:03:37.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 02:03:37.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 02:03:40.129  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 02:03:40.132  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 02:03:40.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 02:03:40.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 02:03:40.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 02:03:40.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 02:03:40.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 02:03:40.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 02:03:40.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 02:03:40.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 02:03:40.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 02:03:40.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 02:03:40.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 02:03:40.178 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 02:03:40.178 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 02:03:40.257 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 02:03:40.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: cee4745a9f081073041faf7a73759c4d7ab065b1a3d6882d09081ebdec4359ba242d00248d11e204cdce1dbe7b49641fa5b099ff4600efc5e174ca8b2490c0920aec35c83c67b8b44f9bcbe428a5345c5ba2f290867d1020081b610dc50805e58ff96cad61f648eae1f0a65caa2a751805f66a48d462c28bd1f1123f0ba50930304387a2ca874d240e9f86fb1b70a93ec3c8d3d6cca55007fbe4e52eeac1ab88f1496b30e610bdcc19836d156dc108db57fc40add32ee6b3f8c54d87da97842661af2359333e11fea37557cd9fbf8d81fda86df06dd378acb037598dd13f35b53270df2055cc745dd2de08ae643f386c333223260c8ebb54d3ca14717ab74d038f9e65c103127591102ddf7200afe6bacc1644450c10ef240399e6c62db9e69ddc191bfeae071ae57d852ae3d63cfa772d35e80449bfe3ca8d18bac0d8cfc0cea44e58718ebda7956f920e2af0371a29c4179390ec0c529a7b7cfb32e0ead7ed6ca80b2d4b55c91caa7b288bf01bbef0e1b6ea48d39e0c6fc6337cd505074653
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:44:b9:61:bc:57:52:65:ab:aa:97:21:ff:d2:f5:af:ff:88:38:c7]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 06:09:49.776  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:09:49.854 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:09:49.858 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-26 06:09:49.859 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:09:49.860  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-26 06:09:49.861  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:09:49.862  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:09:49.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:09:49.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:09:49.864 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:09:49.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:09:49.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:09:49.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:09:49.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:09:50.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:09:50.094  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:09:50.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:09:50.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:09:50.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:09:50.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:09:50.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:09:50.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:09:50.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:09:50.155 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:09:50.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:09:50.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:09:50.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:09:50.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:09:50.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:09:50.161 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:09:50.169 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: cee4745a9f081073041faf7a73759c4d7ab065b1a3d6882d09081ebdec4359ba242d00248d11e204cdce1dbe7b49641fa5b099ff4600efc5e174ca8b2490c0920aec35c83c67b8b44f9bcbe428a5345c5ba2f290867d1020081b610dc50805e58ff96cad61f648eae1f0a65caa2a751805f66a48d462c28bd1f1123f0ba50930304387a2ca874d240e9f86fb1b70a93ec3c8d3d6cca55007fbe4e52eeac1ab88f1496b30e610bdcc19836d156dc108db57fc40add32ee6b3f8c54d87da97842661af2359333e11fea37557cd9fbf8d81fda86df06dd378acb037598dd13f35b53270df2055cc745dd2de08ae643f386c333223260c8ebb54d3ca14717ab74d038f9e65c103127591102ddf7200afe6bacc1644450c10ef240399e6c62db9e69ddc191bfeae071ae57d852ae3d63cfa772d35e80449bfe3ca8d18bac0d8cfc0cea44e58718ebda7956f920e2af0371a29c4179390ec0c529a7b7cfb32e0ead7ed6ca80b2d4b55c91caa7b288bf01bbef0e1b6ea48d39e0c6fc6337cd505074653
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:76:61:2c:91:50:e3:44:19:1a:14:2c:99:4e:60:57:1b:8f:57:a2]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 06:14:37.039  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:14:37.041 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:14:37.043 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 06:14:37.044 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:14:37.044  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 06:14:37.045  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:14:37.046  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:14:37.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:14:37.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:14:37.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:14:37.058 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:14:37.059 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:14:37.059 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:14:37.060 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:14:37.254  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:14:37.255  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:14:37.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:14:37.257 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:14:37.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:14:37.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:14:37.262 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:14:37.262 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:14:37.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:14:37.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:14:37.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:14:37.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:14:37.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:14:37.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:14:37.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:14:37.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:14:37.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:05:9e:b5:fe:d5:8b:bd:49:b7:52:ee:43:65:ff:51:96:8e:7a:0c]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 06:15:10.291  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:15:10.293 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:15:10.295 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-26 06:15:10.296 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:15:10.296  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-26 06:15:10.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:15:10.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:15:10.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:15:10.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:15:10.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:15:10.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:15:10.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:15:10.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:15:10.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:15:10.501  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:15:10.502  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:15:10.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:15:10.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:15:10.504  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:15:10.505  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:15:10.505 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:10.505 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:10.506 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:10.507 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:10.507 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:10.508 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:10.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:10.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:10.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:10.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:15:10.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:5d:4b:b7:ff:e5:0f:c4:3b:30:46:51:64:6b:d6:a8:45:c9:d8:21]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 06:15:43.814  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:15:43.815 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:15:43.816 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-26 06:15:43.818 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:15:43.823  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-26 06:15:43.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:15:43.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:15:43.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:15:43.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:15:43.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:15:43.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:15:43.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:15:43.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:15:43.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:15:43.970  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:15:43.971  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:15:43.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:15:43.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:15:43.973  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:15:43.973  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:15:43.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:43.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:43.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:43.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:43.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:43.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:43.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:43.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:43.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:43.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:15:44.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:51:c3:5a:82:b6:04:1f:72:e3:cc:60:9d:aa:aa:bc:95:db:33:00]
            modulus: d1c25b5bcab0e9e69f79161c862eb6bfe8affb8e74c71e621070b804667bb309e3ae74bd672e3bc806329c8b6e4ce27d2ffc719fa7fcf7b5fa4ccf7df80334dd3c84e6b0f07f4f553b5dbe5c4bc2781b203fbda8cb9643299600117a8f0d3417f18743143aea7ec12cc0bf0027ae6a38b3368eeb1595a08a4294ec7ecbf03e3166f0fa8d361412939d75d70a2918f0bbf8fb86bfa3d81938bdc257b5b6bfe4170a3614742504f5f0cd6f854c44206306a8e1ce2bcde4becfc44179fd5893c6615042d37060663780a24061c6cf5e0a815e49c01d42ae52ee19ec5d8242e22284a7d9fb48ce747da1c52a877a526c86acaed65c2338c37e4a7d0cc7a49e84842b
    public exponent: 10001

] 
2021-10-26 06:15:54.802  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:15:54.803 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:15:54.805 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 06:15:54.805 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:15:54.806  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 06:15:54.806  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:15:54.807  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:15:54.807 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:15:54.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:15:54.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:15:54.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:15:54.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:15:54.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:15:54.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:15:54.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:15:54.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:15:54.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:15:54.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:15:54.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:15:54.960  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:15:54.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:54.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:54.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:54.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:54.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:54.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:54.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:15:54.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:15:54.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:15:54.965 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:15:54.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: cee4745a9f081073041faf7a73759c4d7ab065b1a3d6882d09081ebdec4359ba242d00248d11e204cdce1dbe7b49641fa5b099ff4600efc5e174ca8b2490c0920aec35c83c67b8b44f9bcbe428a5345c5ba2f290867d1020081b610dc50805e58ff96cad61f648eae1f0a65caa2a751805f66a48d462c28bd1f1123f0ba50930304387a2ca874d240e9f86fb1b70a93ec3c8d3d6cca55007fbe4e52eeac1ab88f1496b30e610bdcc19836d156dc108db57fc40add32ee6b3f8c54d87da97842661af2359333e11fea37557cd9fbf8d81fda86df06dd378acb037598dd13f35b53270df2055cc745dd2de08ae643f386c333223260c8ebb54d3ca14717ab74d038f9e65c103127591102ddf7200afe6bacc1644450c10ef240399e6c62db9e69ddc191bfeae071ae57d852ae3d63cfa772d35e80449bfe3ca8d18bac0d8cfc0cea44e58718ebda7956f920e2af0371a29c4179390ec0c529a7b7cfb32e0ead7ed6ca80b2d4b55c91caa7b288bf01bbef0e1b6ea48d39e0c6fc6337cd505074653
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:38:b1:dc:85:11:3a:11:c9:a7:a0:9d:b2:6e:45:c4:c0:d8:22:3e]
            modulus: ee8202bcd1e996dae58c28e99b1d1aac476c76864ef6872bfe69f9e4bbd13c30f3ed6c67a8d61a330b43845b860c134790256c9cb185aee6d87ae0f3846b66877aaaa7241e26f30e68b794ca9ecec5914f2d541def34ecff5f873e4242a136f7de2ffda1603f9604a7141a7e86b8a2c768f815f2206ab9bdc8b328a1c3666987d5e6b0a9fab71b96dd1cda4dc2bd2b0d2c07854aa6c0f8ae00dcf10466f4aefff85b713ce028549f3d1367f9d20b79422046e2914c41b4e4145d3aa24f7e56902f9d6b3e2dafe8d4fc37ca67f30ccd2073df88193677be421e2b33fcd2f59b3dcfa50a04f5225721e39d59c0cfba18dd2b8659745e3e095b397b8c04f1b21f6d
    public exponent: 10001

] 
2021-10-26 06:17:32.179  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:17:32.181 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:17:32.182 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 06:17:32.183 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:17:32.183  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 06:17:32.184  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:17:32.184  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:17:32.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:17:32.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:17:32.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:17:32.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:17:32.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:17:32.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:17:32.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:17:32.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:17:32.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:17:32.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:17:32.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:17:32.355  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:17:32.356  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:17:32.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:17:32.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:17:32.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:17:32.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:17:32.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:17:32.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:17:32.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:17:32.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:17:32.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:17:32.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:17:32.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:9b:1c:45:ce:73:c3:43:53:a0:10:97:26:6d:af:d1:cf:dc:8e:bf]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 06:17:48.457  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:17:48.459 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:17:48.460 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 06:17:48.461 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:17:48.461  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 06:17:48.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:17:48.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:17:48.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:17:48.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:17:48.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:17:48.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:17:48.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:17:48.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:17:48.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:17:48.559  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:17:48.560  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:17:48.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:17:48.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:17:48.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:17:48.562  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:17:48.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:17:48.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:17:48.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:17:48.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:17:48.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:17:48.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:17:48.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:17:48.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:17:48.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:17:48.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:17:48.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:2d:0e:9c:07:82:1d:65:b7:bd:fc:f4:55:66:f6:94:f3:de:c4:b3]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 06:20:25.409  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 06:20:25.411 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 06:20:25.412 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-26 06:20:25.413 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 06:20:25.414  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-26 06:20:25.415  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 06:20:25.415  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 06:20:25.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 06:20:25.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 06:20:25.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 06:20:25.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 06:20:25.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:20:25.454 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 06:20:25.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:20:25.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 06:20:25.587  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 06:20:25.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 06:20:25.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 06:20:25.590  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 06:20:25.590  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 06:20:25.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:20:25.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:20:25.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:20:25.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:20:25.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:20:25.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:20:25.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 06:20:25.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 06:20:25.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 06:20:25.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 06:20:25.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 552328829384488159866738850047990993106541885476
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 01:58:37 UTC 2021
           Final Date: Sun Oct 26 01:58:36 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:75:d3:42:55:69:7e:b7:7e:d5:3d:b0:57:9f:c8:0d:af:2e:fe:b8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a49882c4cb4caa422c1cd8d446a35d6c5f7e6a38
                       0956e844c896cbdcd2911466a6c934922c01b56c
                       863f1b66e088368d3be92e08eed953b9138634dd
                       28c8291c0f2ea383d0f9065be51aea9fde03ac5e
                       2625f6f2119b7bc7dd4c9d72e2509fbfa083a541
                       5a36850b23cd8eeae310c00cec948b15e6f0a638
                       b1d02a4098e96e0468a2f2b3b92ab88ba7b7addc
                       fc6a64b709f849a65e9426130773ee1ab9f202d7
                       83e1c9f489ee4c0cf7608f3e578417521cc30195
                       7e2df8dfa25bb7adf62db571f2aa6bccf3a995df
                       c8ba0e924f104dd1b00fe0d1734c2d4a5b34c75a
                       9b82b819fffa919384ac2621bfa6fb211d2d060b
                       9cc493d432c4e319366d16944a25785ae4a2f25b
                       52bb10fee2bc266f8f292c4de61a2ec4846e12d5
                       1d2266786ee1148205ebe913599414f9968e7420
                       31c3782bd8a872c429245bc348bd1110cf297369
                       044aa7d8a5e59bf1175b5adf629e24bced302747
                       923bca9a69106767318f51e982e8904e7cd918b5
                       6e905e3ea1b1e1000b3100992d3bbe43c7d2355b
                       462e0d8a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:83:22:aa:d7:2c:88:e7:73:14:6a:c5:46:91:51:ce:38:71:2f:ae]
            modulus: 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
    public exponent: 10001

]