Results

By type

          2021-11-10 01:37:16,777 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-10 01:37:20,374 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-10 01:37:22.765  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-10 01:37:34.087 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-10 01:37:35.069  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-10 01:37:35.678  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-10 01:37:45.469  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 30.579 seconds (JVM running for 36.823)
2021-11-10 01:38:03.766  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 01:38:03.779 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 01:38:03.888 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-10 01:38:03.891 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 01:38:03.973  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-10 01:38:03.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 01:38:03.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 01:38:03.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 01:38:03.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 01:38:03.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 01:38:04.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 01:38:04.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 01:38:04.183 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 01:38:04.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 01:38:04.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 01:38:04.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 01:38:05.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 01:38:05.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 01:38:05.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 01:38:05.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 01:38:05.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 01:38:05.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 01:38:05.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 01:38:05.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 01:38:05.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 01:38:05.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 01:38:05.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 01:38:05.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 01:38:05.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 01:38:05.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 01:38:05.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 01:38:05.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 01:38:05.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:0a:78:61:92:97:70:70:a2:b5:93:a1:da:d3:05:04:44:47:5b:35]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:10:00.349  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:10:00.351 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:10:00.354 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-10 03:10:00.355 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:10:00.357  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-10 03:10:00.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:10:00.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:10:00.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:10:00.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:10:00.363 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:10:00.373 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:10:00.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:10:00.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:10:00.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:10:00.563  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:10:00.564  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:10:00.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:10:00.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:10:00.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:10:00.568  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:10:00.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:10:00.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:10:00.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:10:00.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:10:00.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:10:00.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:10:00.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:10:00.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:10:00.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:10:00.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:10:00.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:73:8c:2f:b3:78:ea:68:2f:3d:86:03:b1:4c:a6:8d:0d:0a:9b:64]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:11:45.717  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:11:45.718 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:11:45.720 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 03:11:45.721 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:11:45.721  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 03:11:45.722  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:11:45.723  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:11:45.724 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:11:45.724 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:11:45.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:11:45.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:11:45.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:11:45.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:11:45.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:11:45.860  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:11:45.861  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:11:45.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:11:45.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:11:45.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:11:45.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:11:45.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:11:45.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:11:45.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:11:45.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:11:45.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:11:45.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:11:45.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:11:45.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:11:45.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:11:45.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:11:45.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:df:df:96:85:d2:ca:94:e3:ef:44:5c:d2:74:c3:cb:99:96:31:64]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:14:18.142  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:14:18.143 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:14:18.144 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 03:14:18.145 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:14:18.146  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 03:14:18.146  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:14:18.147  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:14:18.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:14:18.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:14:18.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:14:18.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:14:18.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:14:18.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:14:18.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:14:18.279  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:14:18.280  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:14:18.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:14:18.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:14:18.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:14:18.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:14:18.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:14:18.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:14:18.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:14:18.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:14:18.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:14:18.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:14:18.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:14:18.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:14:18.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:14:18.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:14:18.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:c2:4e:52:e2:14:72:57:37:b9:f2:07:b2:ae:0d:d1:c0:d0:9e:5e]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:14:43.188  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:14:43.189 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:14:43.190 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 03:14:43.191 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:14:43.191  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 03:14:43.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:14:43.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:14:43.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:14:43.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:14:43.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:14:43.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:14:43.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:14:43.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:14:43.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:14:43.348  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:14:43.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:14:43.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:14:43.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:14:43.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:14:43.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:14:43.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:14:43.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:14:43.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:14:43.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:14:43.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:14:43.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:14:43.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:14:43.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:14:43.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:14:43.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:14:43.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:12:9b:69:99:c3:39:dc:94:80:57:bd:60:83:f1:5b:93:47:c2:72]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:15:16.773  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:15:16.774 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:15:16.775 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-10 03:15:16.776 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:15:16.776  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-10 03:15:16.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:15:16.777  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:15:16.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:15:16.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:15:16.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:15:16.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:15:16.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:15:16.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:15:16.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:15:16.868  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:15:16.869  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:15:16.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:15:16.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:15:16.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:15:16.871  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:15:16.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:16.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:16.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:16.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:16.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:16.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:16.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:16.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:16.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:16.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:15:16.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:21:68:1c:7e:2f:14:9a:f9:0a:ec:98:47:af:87:e6:fa:f5:06:29]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:15:50.319  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:15:50.320 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:15:50.321 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-10 03:15:50.322 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:15:50.322  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-10 03:15:50.323  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:15:50.323  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:15:50.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:15:50.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:15:50.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:15:50.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:15:50.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:15:50.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:15:50.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:15:50.402  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:15:50.403  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:15:50.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:15:50.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:15:50.405  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:15:50.463  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:15:50.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:50.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:50.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:50.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:50.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:50.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:50.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:50.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:50.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:50.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:15:50.470 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: a3c3959f672bf5edde0625006791cf28463d1fd14974c46f17f3f89b2fe3a7980e67ab2676dc6e8987fbe20020ae292a7d20f75e80c239c5a19326eacff3e66355ed0bc2b4574977525478f48859ee57bf5f748ebde0b93a1f6c5136433a539ec2739eb6141a30bfe8b7d55afd028d8cd3077e12263c56bdd3d0bd75606f65241e16830a6a7284c8ee34ce0310cb335d91a3ee7dde77ce540af05f0ca9d9cde3b037c689b1b1682904265b21d931309af3090ed40141630426b196584e61fa6f496cc8a4ad74079bd000ac5bf8675391d13047705b4a39ae31e689bc6f5e9e7c61550c097fe43ed2e785a6e05743cc261c2d43a75586607a074ca9db5f525cfff430414c40e94c4883ef2f2c0f38d7bc265dfe48185c9dc373fefd06d7f313f5f7abd9f0d63b537360b1ba7102711bc4f23667940b47bbaaa4b3af6fb5d198e25f0d5a0ba5f766e10a77a1031a53fdfc57fa6ac921b1a645964a09e6f10b94e9d45c54ddc7e5d19e9e83b5ec92f1d44540ba101a1338e54678fa5974a99130d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:6e:ae:3a:6c:f7:59:70:a5:1e:d9:ed:66:52:14:c1:f2:f1:4c:41]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:15:51.706  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:15:51.707 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:15:51.708 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-10 03:15:51.709 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:15:51.710  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-10 03:15:51.710  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:15:51.711  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:15:51.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:15:51.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:15:51.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:15:51.716 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:15:51.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:15:51.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:15:51.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:15:51.782  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:15:51.783  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:15:51.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:15:51.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:15:51.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:15:51.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:15:51.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:51.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:51.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:51.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:51.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:51.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:51.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:15:51.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:15:51.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:15:51.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:15:51.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:5d:54:a9:b3:77:ca:fa:75:ab:97:93:04:1b:12:4a:99:96:28:3a]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 03:17:33.812  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 03:17:33.813 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 03:17:33.815 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 03:17:33.816 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 03:17:33.816  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 03:17:33.817  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 03:17:33.817  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 03:17:33.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 03:17:33.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 03:17:33.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 03:17:33.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 03:17:33.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:17:33.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 03:17:33.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:17:33.938  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 03:17:33.938  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 03:17:33.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 03:17:33.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 03:17:33.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 03:17:33.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 03:17:33.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:17:33.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:17:33.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:17:33.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:17:33.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:17:33.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:17:33.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 03:17:33.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 03:17:33.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 03:17:33.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 03:17:33.946 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 605933948744249727196779252422763038534724416227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 01:32:38 UTC 2021
           Final Date: Mon Nov 10 01:32:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7babc3310067713043d7810c83502865074829
                       2b39fca1374230ff5153e68f577b35fa933f06ed
                       715a6b0500902d35b8b6e49e4890377d7b4acfa7
                       b100cc66334bb855801535433b4f6f9e6a306de1
                       544ab8a66d315032f0e4826021e411dd05b91373
                       3fdd3f9136a24a0f03b154eef25001549f601537
                       9ea3b8dd50150222f86d4e928bff8f9ce3056172
                       e0c5136e3cab2bfc5d3187e25665292604d8e55e
                       9d25a8be9368c0fcc3e716996fadad117a643039
                       a058e5652669464cccf0c56ea20ee6bed8df12ff
                       475601a07d8e267e109947f3f6582584c2b5a52d
                       ded4c7cdb4d20bb380b03add76f3c033fffe4e16
                       fd44b419f292571abbe774e9045a35dc5cf99621
                       03f21d38036ff6848e70b2356c420bab2cca62d9
                       d39b70c8df5a6512f1c9eb6ca93135dcd15c873d
                       f36280be9155247d87b1be1890bbeed92cd18533
                       754a4fd039c045aea05565eb895c5f573078fd24
                       110bddbf29ac970afe5dc95b5dacedfc9830f580
                       2388c17d1e8d1289fcc576d66061bba5b39cf6ca
                       6ec15812
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:f6:62:d2:10:5b:9a:d8:08:9f:b9:78:7d:84:77:00:5d:10:cd:67]
            modulus: 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
    public exponent: 10001

]