Results

By type

          2021-11-04 01:26:02,214 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-04 01:26:06,199 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-04 01:26:09.015  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-04 01:26:20.503 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-04 01:26:21.613  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-04 01:26:22.297  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-04 01:26:32.704  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.306 seconds (JVM running for 38.175)
2021-11-04 01:27:56.409  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 01:27:56.499 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 01:27:56.611 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-04 01:27:56.614 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 01:27:56.705  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-04 01:27:56.708  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 01:27:56.709  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 01:27:56.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 01:27:56.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 01:27:56.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 01:27:56.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 01:27:56.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 01:27:56.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 01:27:56.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 01:27:56.992 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 01:27:56.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 01:27:58.003  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 01:27:58.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 01:27:58.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 01:27:58.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 01:27:58.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 01:27:58.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 01:27:58.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 01:27:58.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 01:27:58.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 01:27:58.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 01:27:58.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 01:27:58.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 01:27:58.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 01:27:58.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 01:27:58.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 01:27:58.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 01:27:58.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:b7:48:fa:ce:26:62:3c:e2:63:f0:48:51:e2:b9:9a:09:70:2e:26]
            modulus: e4ccbde32c509b4ce2ebede0afec489da2a75d89b63a0698c776a22c8346aef3c7fff6eac82802c68f793f705e0bb2720410dc8ef57d8a98155089da4b71619591481060fe38a7881292ebd3613777f697ad6c597ab3641ca32739a03453e9a712714b9141b47d795122bea828bfbd2a8865b4e53213c5b43900e634f05756ddc245fd6ee420aafdd31e0dc702fa14ba0cfa221a21318c6e0d881a7783c6b6a97382887343ff326f58c1c7b48e9941cd83653e451cda23805eeda4714dc3ce309fbfc57b90a23f1a776b45ee5500dd98bb27961fce9b39fbca91e34732e48761c76e06ccf855f357773ea645ea459ae3a9d2830ce54aef0d8b9326daf14c3f57
    public exponent: 10001

] 
2021-11-04 04:36:24.848  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:36:24.850 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:36:24.852 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-04 04:36:24.853 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:36:24.854  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-04 04:36:24.855  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:36:24.855  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:36:24.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:36:24.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:36:24.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:36:24.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:36:24.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:36:24.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:36:24.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:36:25.103  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:36:25.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:36:25.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:36:25.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:36:25.107  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:36:25.108  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:36:25.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:36:25.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:36:25.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:36:25.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:36:25.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:36:25.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:36:25.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:36:25.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:36:25.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:36:25.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:36:25.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:2d:2e:ba:c8:55:af:fe:bd:47:a6:f9:56:94:ca:47:0e:aa:ab:94]
            modulus: bd8a1653a63818af342802e3ed31e6a78647d4641578c89cd0a7bf07dac2698e30b4b312d5b682b0d409b9498db1e91a95671c600f007f4769d0fb2fbdd179d9781e38c151f25b89450e42c93d215bc559a2b3b50bb0c6642b7a3e309e4d3cdbd7d6d680933993055dbff38889d25a9f6898a6fefdea7e627b3a1fb937149e6f8eeff167d045813949b7f8fb96724aded2b7998605e2dcd33467701bfa4dbe3e955cfff78e637fe3f871b7b1150dcb88e245c737c5cd0ea82e74d7be6d83651fe7ec7171b2464d81ee26cc3ab98c737b22fe5365658e458b49dd94b0670f327fe84b171eea81f564ca5f3ed0daedf2dd8f8f41013019d3702b3b3c2526a8529d
    public exponent: 10001

] 
2021-11-04 04:38:38.183  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:38:38.184 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:38:38.185 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:38:38.185 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:38:38.186  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:38:38.187  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:38:38.187  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:38:38.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:38:38.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:38:38.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:38:38.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:38:38.198 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:38:38.198 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:38:38.198 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:38:38.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:38:38.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:38:38.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:38:38.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:38:38.293  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:38:38.294  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:38:38.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:38:38.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:38:38.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:38:38.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:38:38.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:38:38.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:38:38.298 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:38:38.299 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:38:38.299 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:38:38.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:38:38.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:5e:e8:a5:20:2b:f2:48:aa:b1:1b:92:66:87:50:d7:16:e0:51:ed]
            modulus: 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
    public exponent: 10001

] 
2021-11-04 04:40:40.633  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:40:40.635 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:40:40.637 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:40.638 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:40:40.639  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:40.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:40:40.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:40:40.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:40:40.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:40:40.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:40:40.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:40:40.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:40:40.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:40:40.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:40.792  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:40:40.793  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:40:40.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:40:40.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:40.794  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:40:40.795  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:40:40.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:40.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:40.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:40.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:40.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:40.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:40.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:40.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:40.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:40.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:40:40.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:23:be:71:80:8e:8e:ab:5f:06:72:6d:4d:24:87:e2:4c:e5:09:e9]
            modulus: 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
    public exponent: 10001

] 
2021-11-04 04:40:47.745  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:40:47.746 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:40:47.747 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:47.747 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:40:47.748  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:47.748  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:40:47.749  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:40:47.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:40:47.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:40:47.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:40:47.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:40:47.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:40:47.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:40:47.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:47.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:40:47.892  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:40:47.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:40:47.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:47.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:40:47.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:40:47.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:47.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:47.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:47.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:47.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:47.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:47.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:47.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:47.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:47.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:40:47.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:bd:38:97:36:5d:68:db:6f:93:e8:ee:a0:08:98:1f:38:e5:93:29]
            modulus: d48e4246e0ace892b1254a1c02a9ee69702c8c84c53ee6bd211e9ace48b721b0ce1e2dc2a3874652ac320c85f8e25816e1a8424ab0832226f49f91dc16c7baa41754d127780399665ab60310f803f64b9451207e667d81a3cb7fb3b32e53d92364f4b215868b74496c1197bb3db13c1c106d1b175d34cb13700ba89ce5aae3b4c8c0919885fafd7c4746b49858e0dc686ec4566fb3cb3629ca7440b5afa87ed6a72a69bbdfca0f2041b3d8b45e2e09c26f4e088706c1b9fd110fdb6eb852d50a8377cd6b718467a1dfbb9cba142c094b907df381240506cee09aa91cb0191a090ad259b3f49260559cee75e7479d7cd13ae36a7c0b3f804e5a95300f7a49fa69
    public exponent: 10001

] 
2021-11-04 04:41:12.915  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:41:12.916 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:41:12.917 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-04 04:41:12.917 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:41:12.918  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-04 04:41:12.918  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:41:12.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:41:12.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:41:12.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:41:12.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:41:12.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:41:12.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:41:12.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:41:12.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:13.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:41:13.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:41:13.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:41:13.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:13.094  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:41:13.094  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:41:13.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:13.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:13.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:13.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:13.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:13.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:13.097 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:13.097 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:13.097 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:13.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:41:13.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:80:f5:8c:fe:3f:e4:ea:65:87:15:88:54:20:84:78:42:1b:8d:38]
            modulus: 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
    public exponent: 10001

] 
2021-11-04 04:41:45.331  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:41:45.332 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:41:45.333 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-04 04:41:45.333 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:41:45.334  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-04 04:41:45.335  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:41:45.335  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:41:45.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:41:45.339 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:41:45.339 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:41:45.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:41:45.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:41:45.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:41:45.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:45.492  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:41:45.493  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:41:45.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:41:45.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:45.495  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:41:45.495  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:41:45.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:45.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:45.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:45.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:45.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:45.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:45.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:45.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:45.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:45.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:41:45.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: b553a41588263a5d85a2614ab52418477c5fa3722afd7c6aa2cf2005d245fd67ccd3ca29b9adfe906f01521cd944a8f2d872d30d5f4b639f692bcad8905e08e19a1cd09116b38758c37734aebed40a53d4359839111da0b4ba7ee06a7562398f2e8466866b6ec785c3dc5d3d079639388dfba4a3d6a8c9327f0875986b68cf84c2e19e7228ef647049e5a0339dad907746ad79b18a2650d26c75043c513df1dc8a135d34c67eae7ddf03270794389e58794be0d77f71316edcc62a40e4a3484939492b20316b2ae3725f85d8fcde030bd73034349b22813e5db591254ea15fa31368c7a50b8bae0e2afb40bc9e1a9b68f3c38deb50986bddc0d31577b7da936e934c115358cfd88819788f981ec381f772b2e7bb13a278082f3bfe2f003a733a00dfecd5cc6a8d16acbd6a16326b0b82bb52eb2198ea135dea56936d0ba2b7f263de856045e2edbcf268d3cf478509ceb2e67e6b295fe6093328a60bb5b1243adce4ad0b7b9f9b2c0556a8f826c8d059fec9f919f09bd8424dbd5c63bc3c58f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:aa:43:ac:af:a2:44:1f:ea:77:52:9e:b1:6b:e8:68:0d:7a:4c:5d]
            modulus: ccefd7cdb86432508fdc7e1a36a87e3ca18c9dfb762d6b87812223deb5a96077702417243f5101a99837f4a562e91eaf4c5deb2f7a28b97b097d0dee7beef11b6547120d3141138594e792e9086af5e5602a87ced1eb8244bd4f8e10554bad8622b479e82712111b55255bd5dee4eb39dc977aac8203deaf7d34341730984ebf9aea1ba447405dee67aba07fa98435d1b5dffcd6bc7d74f3767c21854511e7017d04e3ab2eb45f1fbc66d42d49231cb4cf3d422b1eacc78c61aa00248da968083f45d0f9290b088dc43bfdde239f7e1d39b8bebdcd460b2921295138ff3d4302bd8bbd6ffd1b92e8b1dbae41cceb6b144281acd723481a95eec79ae928c9ed3d
    public exponent: 10001

] 
2021-11-04 04:42:59.852  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:42:59.853 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:42:59.854 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-04 04:42:59.854 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:42:59.855  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-04 04:42:59.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:42:59.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:42:59.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:42:59.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:42:59.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:42:59.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:42:59.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:42:59.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:42:59.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:42:59.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:42:59.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:42:59.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:42:59.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:42:59.993  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:42:59.993  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:42:59.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:42:59.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:42:59.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:42:59.995 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:42:59.995 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:42:59.996 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:42:59.996 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:42:59.997 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:42:59.997 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:42:59.998 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:43:00.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: b553a41588263a5d85a2614ab52418477c5fa3722afd7c6aa2cf2005d245fd67ccd3ca29b9adfe906f01521cd944a8f2d872d30d5f4b639f692bcad8905e08e19a1cd09116b38758c37734aebed40a53d4359839111da0b4ba7ee06a7562398f2e8466866b6ec785c3dc5d3d079639388dfba4a3d6a8c9327f0875986b68cf84c2e19e7228ef647049e5a0339dad907746ad79b18a2650d26c75043c513df1dc8a135d34c67eae7ddf03270794389e58794be0d77f71316edcc62a40e4a3484939492b20316b2ae3725f85d8fcde030bd73034349b22813e5db591254ea15fa31368c7a50b8bae0e2afb40bc9e1a9b68f3c38deb50986bddc0d31577b7da936e934c115358cfd88819788f981ec381f772b2e7bb13a278082f3bfe2f003a733a00dfecd5cc6a8d16acbd6a16326b0b82bb52eb2198ea135dea56936d0ba2b7f263de856045e2edbcf268d3cf478509ceb2e67e6b295fe6093328a60bb5b1243adce4ad0b7b9f9b2c0556a8f826c8d059fec9f919f09bd8424dbd5c63bc3c58f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:d2:42:b6:87:f9:57:5c:db:2a:27:56:0c:de:8c:7a:4a:d0:3a:99]
            modulus: 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
    public exponent: 10001

] 
2021-11-04 04:43:30.024  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-04 04:43:30.025 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-04 04:43:30.026 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:43:30.027 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:43:30.027  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:43:30.028  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-04 04:43:30.028  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-04 04:43:30.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-04 04:43:30.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-04 04:43:30.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-04 04:43:30.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-04 04:43:30.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:43:30.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-04 04:43:30.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:43:30.164  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-04 04:43:30.164  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-04 04:43:30.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-04 04:43:30.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:43:30.166  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-04 04:43:30.166  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-04 04:43:30.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:43:30.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:43:30.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:43:30.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:43:30.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:43:30.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:43:30.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:43:30.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:43:30.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:43:30.171 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:43:30.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 321540723014156983648203595336572206884532340486
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 04 01:23:03 UTC 2021
           Final Date: Tue Nov 04 01:23:02 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
                       a9afc410ab74de9de1017c8892658d125828646c
                       45d75cf7366c852b8552215352ea2a443003bbf6
                       4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
                       fbbe90da1d85eed430dfdb75b87fabf4dbb21896
                       16904489ce191aa3f758b185eb84c076ff103266
                       9953743964a7eb0da3bfd9177ecb3926ff2ace1e
                       281b5eeb40a97426da3ba043850f9c032c78e2d4
                       247db2335de90dfbbc58eb361954daf4194ecb1b
                       febac38d37c366f5eebe6b293e940c843f27a292
                       71ef2f3b563064728189fd5c16f31fb06a175ba0
                       9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
                       450f2759ceec24071c6d3ed7861b5d93a09da9ee
                       9022c16534146563091f45040c0860802a9967f2
                       b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
                       76d720ce4885ccc260656517f8b17faf8b0a4d41
                       bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
                       5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
                       0189068faac8cb422650a0545edb51cdc16637c2
                       b2e25366
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:dc:df:b7:36:b9:3b:d6:66:08:63:31:ab:64:b0:8f:20:18:2a:ed]
            modulus: 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
    public exponent: 10001

]