Results

By type

          2021-11-17 01:54:43,585 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-17 01:54:47,371 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-17 01:54:49.889  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-17 01:55:02.687 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-17 01:55:04.085  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-17 01:55:04.684  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-17 01:55:15.679  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.482 seconds (JVM running for 41.475)
2021-11-17 01:56:00.280  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 01:56:00.375 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 01:56:00.489 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-17 01:56:00.493 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 01:56:00.579  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-17 01:56:00.582  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 01:56:00.583  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 01:56:00.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 01:56:00.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 01:56:00.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 01:56:00.679 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 01:56:00.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 01:56:00.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 01:56:00.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 01:56:00.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 01:56:00.879 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 01:56:02.132  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 01:56:02.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 01:56:02.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 01:56:02.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 01:56:02.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 01:56:02.176  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 01:56:02.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 01:56:02.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 01:56:02.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 01:56:02.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 01:56:02.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 01:56:02.272 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 01:56:02.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 01:56:02.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 01:56:02.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 01:56:02.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 01:56:02.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:4d:9b:24:ce:20:b0:ca:f8:41:3c:8c:20:d5:1e:eb:b7:86:cf:fe]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:07:33.043  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:07:33.045 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:07:33.046 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-17 06:07:33.047 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:07:33.048  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-17 06:07:33.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:07:33.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:07:33.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:07:33.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:07:33.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:07:33.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:07:33.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:07:33.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:07:33.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:07:33.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:07:33.275  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:07:33.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:07:33.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:07:33.278  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:07:33.278  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:07:33.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:07:33.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:07:33.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:07:33.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:07:33.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:07:33.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:07:33.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:07:33.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:07:33.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:07:33.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:07:33.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:8f:48:77:74:08:5a:09:ad:b7:a5:00:a6:7c:da:2d:34:ce:05:e7]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:09:23.547  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:09:23.548 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:09:23.549 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 06:09:23.550 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:09:23.551  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 06:09:23.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:09:23.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:09:23.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:09:23.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:09:23.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:09:23.575 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:09:23.575 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:09:23.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:09:23.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:09:23.658  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:09:23.671  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:09:23.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:09:23.672 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:09:23.673  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:09:23.674  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:09:23.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:09:23.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:09:23.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:09:23.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:09:23.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:09:23.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:09:23.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:09:23.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:09:23.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:09:23.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:09:23.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:71:30:21:8e:cf:ba:b8:ff:04:04:b2:07:76:20:81:c4:40:5f:da]
            modulus: f824a21cc7b2879dd621458a806f135df1a8b482ab48663d480081e651b48374ed6df28e27efd7e6a5a85bd1468275fc7b168074488a53bc50a4e4f2c539f4f517c356944347cf20f4188f5e992e71424d82625fcf241f905c8c97d5dbda8aa8268202a336c6c4a234284dae2eb2b17c4a4199813baec870dad9c08855731f78dc0a4aa0df6bcc5258979b57688337140675e3d3eab4a5ea0842e3aa390e0ed997b3c8f8df2b4c3850201eb473c766ed7f815fe0b8c57a6497237c9b9a5078f8a69c1865a0a8f21f024e132b7b0335632273568632a62bc2c6faaa348e7a612315090d55c8f39468f50d86be30137a645f16c7ae410e5008be89217cf18643c3
    public exponent: 10001

] 
2021-11-17 06:13:02.998  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:13:02.999 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:13:03.001 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 06:13:03.002 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:13:03.006  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 06:13:03.007  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:13:03.007  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:13:03.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:13:03.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:13:03.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:13:03.011 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:13:03.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:13:03.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:13:03.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:13:03.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:13:03.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:13:03.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:13:03.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:13:03.182  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:13:03.182  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:13:03.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:03.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:03.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:03.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:03.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:03.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:03.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:03.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:03.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:03.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:13:03.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:64:11:cc:39:72:b5:bd:53:07:b8:59:d3:0e:3b:bd:5b:b7:c0:77]
            modulus: a3945d16b70e5b7b36e325525e05580b3ffcfe79ad3e2d06bfcd16449f4348c8a1f816d22cab3e9540b1c3e369c6c83e67a3696cec020066d35b712c34020181fe664d2a97952e7fe771a2ede05692f2b93c5dcf7009d359bc60c0a9a5bfac770703dd3977459eab2e915b36cc6b56b9725af1f9aaacc1197f028126d0375ea02477645d7bdf26a0728d130361121d68d93621400af99a2173844d00a03ffe849840efbf0193ca42cbcf0872ef226d61145f6056c6af677e99df37e7aae6a9e1fd714ede29e752da025f50265017b3a1f77e7f83fc1d16eb5d82380d25f28abee386f517dffa2caf831a8ce09d82ba167615910de34d64418438f6bdfe0cbeeb
    public exponent: 10001

] 
2021-11-17 06:13:35.222  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:13:35.223 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:13:35.224 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-17 06:13:35.224 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:13:35.224  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-17 06:13:35.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:13:35.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:13:35.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:13:35.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:13:35.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:13:35.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:13:35.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:13:35.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:13:35.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:13:35.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:13:35.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:13:35.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:13:35.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:13:35.372  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:13:35.372  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:13:35.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:35.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:35.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:35.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:35.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:35.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:35.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:35.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:35.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:35.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:13:35.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:f3:37:95:96:8f:a2:82:a0:1e:7c:bd:3a:a1:bd:09:8a:7e:52:ef]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:13:56.994  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:13:56.996 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:13:56.997 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 06:13:56.998 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:13:56.998  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 06:13:56.999  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:13:56.999  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:13:56.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:13:57.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:13:57.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:13:57.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:13:57.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:13:57.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:13:57.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:13:57.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:13:57.235  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:13:57.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:13:57.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:13:57.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:13:57.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:13:57.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:57.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:57.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:57.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:57.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:57.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:57.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:13:57.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:13:57.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:13:57.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:13:57.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:36:6e:c5:c8:0b:ac:b5:fb:f2:ba:3e:36:26:92:c3:8c:62:ac:8e]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:14:10.711  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:14:10.712 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:14:10.714 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-17 06:14:10.715 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:14:10.715  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-17 06:14:10.716  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:14:10.716  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:14:10.716 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:14:10.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:14:10.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:14:10.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:14:10.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:14:10.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:14:10.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:14:10.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:14:10.853  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:14:10.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:14:10.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:14:10.854  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:14:10.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:14:10.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:14:10.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:14:10.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:14:10.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:14:10.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:14:10.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:14:10.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:14:10.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:14:10.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:14:10.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:14:10.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: e7df1a761979b7c492fe365cc7ed90d00c79963cff342c4990391ed084949892caef4db8656442088f4ba9c7736146374c2f763e59486efb9e920cfd880b694e1d8b05edaf64a59b92e6214d6f684a31bbcef6dd5572f8905e18f57ce115febec59d0abc9fa067bcaa0b6d90edd4e5d4b52da79fb710dc815f9075f1144bcc283edf84879423b4e36326bbd43786058913ea5f2b97ba10b4fe2cffd803194009a5672335c738f4e17848fc692e9bc28a8258a286544d35c694fc13ab4c09fa427b45de451648dd5c3394f2b6124af38135739acd60fd65ca57972ec64c4388da31dd4f61051f7e6216c5a980c78651fb70ce359241c5d50a3e65b572aa26b381540d88d8113574ad346b8f302bdf0ab538d40a06f3547df2a01ba31c75c1425cfb10623bee7a1ed0677b1a577ed2199eadfcdafd014e47d8a7565528eccfe329c39897214a4cfa7042ae0c56d7eef55dee6922d2543dc59117023c67e8e27360a58bfa8e254f2a1a3a09fdb93c06445d29fa00a5b933333d144075d52a0282cb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:60:24:be:29:92:e9:21:fd:a4:20:83:27:09:88:62:df:99:ab:10]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:15:30.202  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:15:30.203 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:15:30.204 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-17 06:15:30.205 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:15:30.205  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-17 06:15:30.206  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:15:30.206  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:15:30.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:15:30.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:15:30.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:15:30.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:15:30.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:15:30.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:15:30.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:15:30.297  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:15:30.297  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:15:30.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:15:30.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:15:30.298  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:15:30.299  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:15:30.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:15:30.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:15:30.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:15:30.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:15:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:15:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:15:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:15:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:15:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:15:30.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:15:30.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: e7df1a761979b7c492fe365cc7ed90d00c79963cff342c4990391ed084949892caef4db8656442088f4ba9c7736146374c2f763e59486efb9e920cfd880b694e1d8b05edaf64a59b92e6214d6f684a31bbcef6dd5572f8905e18f57ce115febec59d0abc9fa067bcaa0b6d90edd4e5d4b52da79fb710dc815f9075f1144bcc283edf84879423b4e36326bbd43786058913ea5f2b97ba10b4fe2cffd803194009a5672335c738f4e17848fc692e9bc28a8258a286544d35c694fc13ab4c09fa427b45de451648dd5c3394f2b6124af38135739acd60fd65ca57972ec64c4388da31dd4f61051f7e6216c5a980c78651fb70ce359241c5d50a3e65b572aa26b381540d88d8113574ad346b8f302bdf0ab538d40a06f3547df2a01ba31c75c1425cfb10623bee7a1ed0677b1a577ed2199eadfcdafd014e47d8a7565528eccfe329c39897214a4cfa7042ae0c56d7eef55dee6922d2543dc59117023c67e8e27360a58bfa8e254f2a1a3a09fdb93c06445d29fa00a5b933333d144075d52a0282cb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:2a:22:9a:eb:6b:2c:01:6b:2a:9a:e8:23:96:34:19:ee:64:fc:0c]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:16:35.712  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:16:35.713 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:16:35.714 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 06:16:35.714 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:16:35.715  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 06:16:35.715  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:16:35.715  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:16:35.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:16:35.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:16:35.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:16:35.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:16:35.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:16:35.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:16:35.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:16:35.829  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:16:35.829  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:16:35.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:16:35.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:16:35.831  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:16:35.831  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:16:35.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:16:35.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:16:35.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:16:35.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:16:35.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:16:35.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:16:35.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:16:35.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:16:35.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:16:35.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:16:35.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:1b:ef:c3:dd:70:bb:e4:dd:47:64:bb:06:c8:6f:c3:8d:b2:41:50]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:20:14.256  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:20:14.257 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:20:14.259 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 06:20:14.259 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:20:14.260  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-17 06:20:14.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:20:14.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:20:14.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:20:14.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:20:14.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:20:14.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:20:14.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:20:14.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:20:14.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:20:14.347  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:20:14.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:20:14.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:20:14.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:20:14.352  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:20:14.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:20:14.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:20:14.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:20:14.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:20:14.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:20:14.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:20:14.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:20:14.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:20:14.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:20:14.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:20:14.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:20:14.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:00:d9:ce:e7:23:01:81:91:6b:03:4a:5d:ad:b2:9c:45:3d:8c:69]
            modulus: c145441817eecd866d7927c3bed1a6c593c18eb3370b925831dbd9aba7b2f2cd24e8369ee15e2d7d8cef813fe183f9ef66ab59e242779554e8d658379a163e00c90a5e8e4546175438dc0d2de0cc4844d57b81f0ec5ab12c06675699bf0cf88622c1b43507e8b59d853740082cea674d6322de0dcfc87003dbf9c7b779801325ca2aac5cc62cdafa4286ce8da11e79b26119cea926a90715e91a3e952cf44f71523c9826b0757de062c41458434ad1a002cbcac5dd7b33208244558253191b86023032a8628e0246988b195c84ab53f2abd396d7da89f656bf651ca04ea20c34941b848c424acbb98cf2b0b00955f2f8c516931a81082671dc512d039342eaf1
    public exponent: 10001

] 
2021-11-17 06:21:26.490  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:21:26.492 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:21:26.493 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 06:21:26.493 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:21:26.494  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-17 06:21:26.494  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:21:26.494  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:21:26.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:21:26.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:21:26.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:21:26.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:21:26.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:21:26.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:21:26.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:21:26.577  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:21:26.577  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:21:26.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:21:26.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:21:26.579  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:21:26.579  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:21:26.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:21:26.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:21:26.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:21:26.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:21:26.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:21:26.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:21:26.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:21:26.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:21:26.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:21:26.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:21:26.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:8e:f6:76:35:9a:09:4d:aa:8a:c2:54:aa:cf:c8:07:6d:09:0b:6a]
            modulus: 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
    public exponent: 10001

] 
2021-11-17 06:23:00.477  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-17 06:23:00.478 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-17 06:23:00.479 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-17 06:23:00.479 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-17 06:23:00.479  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-17 06:23:00.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-17 06:23:00.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-17 06:23:00.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-17 06:23:00.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-17 06:23:00.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-17 06:23:00.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-17 06:23:00.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:23:00.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-17 06:23:00.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:23:00.579  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-17 06:23:00.580  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-17 06:23:00.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-17 06:23:00.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-17 06:23:00.583  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-17 06:23:00.583  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-17 06:23:00.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:23:00.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:23:00.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:23:00.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:23:00.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:23:00.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:23:00.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-17 06:23:00.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-17 06:23:00.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-17 06:23:00.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-17 06:23:00.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 242620217576652592282531682586930295203260730636
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 17 01:50:20 UTC 2021
           Final Date: Mon Nov 17 01:50:19 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ba:5f:b3:8b:e7:86:6d:3f:01:86:4f:51:95:43:73:7b:28:7d:53:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: df1641eb29032808150728d01b3a2aee41d0c13d
                       711e145685c19c994267cb823a32118b6b4a7cd0
                       9b3612e4516a303bb5b3c208840950142687d40c
                       c195ad6dcacb67be8295cf08d537c464d05d2389
                       cd04b5f4c058494ba84d1e70e9b1a599630c9686
                       ad2acadaf582518f99813c344c7bc5085817d620
                       988eb8a5d8245a19ef8fc52fa16ca9e7c81e44c7
                       5a32b818eeb03107ec412900e7c82c7a0d19fcaf
                       af9e4c3f3ca179ed08efeceaeed58ff74a418da6
                       f0a6da45c0d632266f77b1a5bd9cf393a6302803
                       17b557bfda062b73ffc9b8c5b8f6a3dfb4001189
                       3f276907640983a829b3f7aa39ec6d450087c018
                       ab8f2a83be89bb1ce52ce246070bcf27bdc0e995
                       f9831aa41cb86690e268f12a963de996c5051024
                       f9c28b70ce8e0914ef732cb0ae45a225894d0b85
                       1fa6e668822591b49b3a6186a65af6d118b6722f
                       50777d81dec328e957166cb6467936e8f226e8ba
                       81b0e176c83a52bffd361dacd40e0336bb1484f0
                       601baf820f48105463c6f28f3664031f0a68b19c
                       884e19df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:a4:35:6a:61:61:88:c5:e8:4d:3b:83:40:fa:76:69:cd:de:eb:6c]
            modulus: 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
    public exponent: 10001

]