Results

By type

          2021-11-13 02:39:09,924 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-13 02:39:13,831 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-13 02:39:16.733  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-13 02:39:28.731 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-13 02:39:29.928  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-13 02:39:30.522  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-13 02:39:41.723  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.788 seconds (JVM running for 39.912)
2021-11-13 02:41:39.318  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 02:41:39.327 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 02:41:39.515 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-13 02:41:39.519 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 02:41:39.536  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-13 02:41:39.539  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 02:41:39.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 02:41:39.615 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 02:41:39.616 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 02:41:39.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 02:41:39.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 02:41:39.630 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 02:41:39.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 02:41:39.825 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 02:41:39.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 02:41:39.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 02:41:41.517  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 02:41:41.521  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 02:41:41.522 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 02:41:41.524 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 02:41:41.535  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 02:41:41.536  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 02:41:41.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 02:41:41.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 02:41:41.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 02:41:41.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 02:41:41.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 02:41:41.624 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 02:41:41.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 02:41:41.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 02:41:41.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 02:41:41.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 02:41:41.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:d3:0c:7c:3d:11:e9:9d:d3:ff:71:e8:f9:95:59:35:cc:f7:cc:b7]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:29:30.102  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:29:30.104 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:29:30.114 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-13 04:29:30.115 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:29:30.117  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-13 04:29:30.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:29:30.119  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:29:30.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:29:30.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:29:30.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:29:30.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:29:30.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:29:30.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:29:30.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:29:30.415  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:29:30.416  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:29:30.416 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:29:30.417 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:29:30.420  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:29:30.421  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:29:30.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:29:30.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:29:30.422 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:29:30.513 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:29:30.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:29:30.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:29:30.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:29:30.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:29:30.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:29:30.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:29:30.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:97:29:83:a9:09:70:6a:e9:21:f2:2e:2f:26:1f:54:21:12:7c:cb]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:31:04.304  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:31:04.306 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:31:04.307 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:31:04.308 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:31:04.308  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:31:04.309  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:31:04.309  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:31:04.309 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:31:04.310 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:31:04.310 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:31:04.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:31:04.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:31:04.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:31:04.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:31:04.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:31:04.415  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:31:04.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:31:04.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:31:04.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:31:04.418  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:31:04.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:31:04.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:31:04.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:31:04.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:31:04.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:31:04.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:31:04.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:31:04.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:31:04.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:31:04.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:31:04.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:db:44:8a:b2:b9:13:43:c2:4e:d6:c4:7f:7b:28:bb:b6:a8:90:6d]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:34:27.373  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:34:27.374 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:34:27.376 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:27.377 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:34:27.378  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:27.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:34:27.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:34:27.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:34:27.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:34:27.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:34:27.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:34:27.414 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:27.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:27.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:27.521  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:34:27.522  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:34:27.523 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:34:27.523 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:27.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:34:27.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:34:27.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:27.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:27.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:27.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:27.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:27.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:27.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:27.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:27.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:27.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:34:27.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:bc:72:ef:54:b8:fd:b9:3c:75:15:7e:7a:ad:28:ad:9e:86:65:8a]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:34:27.820  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:34:27.821 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:34:27.823 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:27.823 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:34:27.824  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:27.825  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:34:27.825  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:34:27.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:34:27.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:34:27.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:34:27.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:34:27.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:27.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:27.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:27.907  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:34:27.908  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:34:27.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:34:27.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:27.910  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:34:27.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:34:27.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:27.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:27.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:27.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:27.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:27.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:27.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:27.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:27.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:27.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:34:27.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:56:0f:7e:ad:c9:8b:23:4f:37:a3:72:31:5b:c1:83:04:ee:88:57]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:34:35.275  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:34:35.276 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:34:35.277 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:35.278 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:34:35.278  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:35.279  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:34:35.279  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:34:35.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:34:35.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:34:35.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:34:35.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:34:35.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:35.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:35.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:35.389  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:34:35.412  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:34:35.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:34:35.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:35.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:34:35.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:34:35.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:35.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:35.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:35.416 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:35.416 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:35.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:35.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:35.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:35.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:35.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:34:35.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:0f:77:e9:e1:8d:67:69:64:49:7e:a2:a3:29:e1:e7:97:d1:ca:e6]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:34:35.798  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:34:35.799 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:34:35.800 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:35.801 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:34:35.801  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-13 04:34:35.802  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:34:35.802  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:34:35.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:34:35.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:34:35.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:34:35.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:34:35.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:35.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:35.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:35.867  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:34:35.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:34:35.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:34:35.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:35.914  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:34:35.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:34:35.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:35.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:35.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:35.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:35.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:35.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:35.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:35.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:35.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:35.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:34:35.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:0f:77:e9:e1:8d:67:69:64:49:7e:a2:a3:29:e1:e7:97:d1:ca:e6]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:34:58.987  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:34:58.988 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:34:58.989 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-13 04:34:58.989 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:34:58.990  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-13 04:34:58.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:34:58.991  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:34:58.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:34:58.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:34:58.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:34:58.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:34:58.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:58.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:34:58.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:59.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:34:59.082  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:34:59.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:34:59.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:34:59.083  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:34:59.083  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:34:59.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:59.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:59.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:59.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:59.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:59.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:59.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:34:59.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:34:59.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:34:59.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:34:59.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:3a:70:a7:63:02:34:ef:72:21:7a:bd:7a:b7:5e:32:bc:75:4b:49]
            modulus: b37be376936dd66b4e38efd4d552cf859b737660fa584188bea01f99f23eacf8e5e1b541a4a94356c9b0c9b37620a843d67b5df555872f8c1a1e414b6d5e2b67e7c3c0edc2181db7bd094741d82bb745e01d30e4234967649df3d2afa210b7e95da6bd2258e1abe18bb522af901d6eadae154afc1019d8c63f06ee965ff40c5ea55436aa0ea3e0d5fb88e30d9b7a407b9c0d2d5c1e537b2d061fbc1ea4c096e8037bb131e867dd4531aa1d5cf8b02e3c58c0e15f24f553a178d430dc7733ba9369b6a26bc4dffb36e1e63d921fd82256746552f2a3050fe3f57411f4eae40b94bb966538fb859c5219c0683a5b321e2e79af426edd2ce472d6bfac139a450ed3
    public exponent: 10001

] 
2021-11-13 04:35:32.662  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:35:32.663 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:35:32.664 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-13 04:35:32.665 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:35:32.665  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-13 04:35:32.666  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:35:32.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:35:32.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:35:32.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:35:32.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:35:32.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:35:32.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:35:32.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:35:32.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:35:32.755  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:35:32.756  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:35:32.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:35:32.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:35:32.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:35:32.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:35:32.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:35:32.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:35:32.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:35:32.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:35:32.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:35:32.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:35:32.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:35:32.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:35:32.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:35:32.761 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:35:32.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:d1:c6:41:83:40:d8:ef:cd:63:27:20:42:e1:23:9b:31:66:cb:05]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:35:33.016  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:35:33.017 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:35:33.019 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-13 04:35:33.019 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:35:33.020  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-13 04:35:33.021  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:35:33.021  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:35:33.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:35:33.022 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:35:33.022 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:35:33.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:35:33.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:35:33.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:35:33.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:35:33.081  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:35:33.082  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:35:33.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:35:33.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:35:33.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:35:33.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:35:33.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:35:33.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:35:33.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:35:33.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:35:33.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:35:33.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:35:33.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:35:33.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:35:33.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:35:33.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:35:33.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: a5d37512a5b6280c9d4adc02d58eb24f6451e44edcaf04ae2c366bebc4a6bdc04d7af84b304482a5e1c02fc0d9884118879aed774db2db1bb75f770b98925ca66ab33909685efce39a9680ef6164c3a69bbf14b9a4159ec3eb9e462eaac11d5c5b666b5bd11fbdb3b5d605883c8790bd2b36ae3f065ad6295b61adc425e2cb1ac63f38e7f8daa78ea0037bb90a8b21235bce223048db8507488f61e81e2ae8e493106c3addbd0b210f4dbde5cd1b83fffa75d97c2329bf27d666bcf5a3d092be864d98314cd71a65e39a8466201a0ce90f7ebd99200370dd316851f2340282080112611bbc20655f73c53dc2ada18b3281a20479eb30ca28bd5d291819d793b1f1d95d1ed8ce6570de0b278cc03b48dfd07424e591a189a67ab59bb74a528165c73d86701208079f0b5cc5cf840450ec29aee7f6cdfe178c255b3a2dd25753ef2ea7bf04affc4dcecf1ca272a127aa764e8771be3046d57a67e22c94d490d8b289189b32043a73253c8eb8dd3f30d66592642f0c21ca029405ae96990b3632cb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:d1:c6:41:83:40:d8:ef:cd:63:27:20:42:e1:23:9b:31:66:cb:05]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:36:26.675  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:36:26.675 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:36:26.676 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-13 04:36:26.677 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:36:26.677  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-13 04:36:26.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:36:26.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:36:26.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:36:26.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:36:26.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:36:26.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:36:26.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:36:26.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:36:26.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:36:26.832  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:36:26.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:36:26.833 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:36:26.833 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:36:26.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:36:26.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:36:26.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:36:26.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:36:26.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:36:26.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:36:26.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:36:26.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:36:26.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:36:26.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:36:26.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:36:26.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:36:26.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:e6:b3:ac:12:56:4a:7f:f8:a8:67:ac:d5:68:6c:cd:41:36:17:f7]
            modulus: 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
    public exponent: 10001

] 
2021-11-13 04:37:17.161  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-13 04:37:17.162 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-13 04:37:17.163 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:37:17.164 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-13 04:37:17.164  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-13 04:37:17.164  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-13 04:37:17.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-13 04:37:17.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-13 04:37:17.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-13 04:37:17.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-13 04:37:17.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-13 04:37:17.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:37:17.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-13 04:37:17.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:37:17.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-13 04:37:17.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-13 04:37:17.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-13 04:37:17.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-13 04:37:17.245  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-13 04:37:17.245  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-13 04:37:17.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:37:17.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:37:17.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:37:17.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:37:17.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:37:17.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:37:17.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-13 04:37:17.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-13 04:37:17.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-13 04:37:17.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-13 04:37:17.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 110456046414244145669829431371583329452402169430
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 13 02:27:48 UTC 2021
           Final Date: Thu Nov 13 02:27:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915
                       326defc29b0f810cd48787e57e4d01116410de8f
                       d80b7019bd3414844e366bb6774b80a4b1685718
                       6695bfc24807eed22eddfcd5816ab6bbf308017a
                       186027b4fc2cc3e5459644bde622c576a47b89a6
                       e3c48146096b1e87749e4e2307eef25d4e8dc974
                       310442cb7b153c3b5a03c5fe4f3cde154d27499a
                       5f7184c89eb2e58e402c3a4b077986cbe975df97
                       54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44
                       b3eedd33b67ac3e0fc7eff00e0590cd02502f587
                       039dd31b396d54c8a078d9cfb24d77ae1e2ddaca
                       15c53bf815dc0a1dba327346d3127cc629b6e956
                       8cbb14f5083972d0e7eacf906c7331b19a57d774
                       b8244c5393b1a34d68159d701ba5afcfede4af4f
                       97c0d1b12d66e0664a70c098eb2d46b892ddb015
                       248bea07b09f434a7217a7f4e96661acf860e6f9
                       1dc7a01601b7e9b7dbdf461e6e0316f103d824f3
                       c9671633857138fabf5d9b7f0adb04b9f5f5e898
                       77a253ae990e03c20b3b6bb2b1cf5a28cd617f97
                       14eeb389
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:ad:12:da:6e:ee:d3:73:75:f1:0c:65:54:72:d4:69:50:f4:d6:93]
            modulus: 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
    public exponent: 10001

]