Results

By type

          2021-11-30 01:42:09,299 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-30 01:42:13,995 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-30 01:42:17.091  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-30 01:42:30.798 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-30 01:42:32.095  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-30 01:42:32.895  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-30 01:42:47.196  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.103 seconds (JVM running for 47.554)
2021-11-30 01:43:23.294  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 01:43:23.384 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 01:43:23.580 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-30 01:43:23.585 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 01:43:23.683  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-30 01:43:23.688  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 01:43:23.689  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 01:43:23.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 01:43:23.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 01:43:23.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 01:43:23.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 01:43:23.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 01:43:23.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 01:43:23.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 01:43:23.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 01:43:23.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 01:43:25.336  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 01:43:25.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 01:43:25.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 01:43:25.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 01:43:25.348  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 01:43:25.349  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 01:43:25.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 01:43:25.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 01:43:25.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 01:43:25.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 01:43:25.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 01:43:25.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 01:43:25.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 01:43:25.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 01:43:25.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 01:43:25.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 01:43:25.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:3b:e3:1f:af:bc:33:2f:3a:ab:b0:62:f9:25:e8:0f:28:52:2d:fa]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:14:29.499  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:14:29.501 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:14:29.504 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-30 03:14:29.505 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:14:29.582  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-30 03:14:29.584  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:14:29.585  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:14:29.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:14:29.587 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:14:29.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:14:29.600 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:14:29.602 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:14:29.602 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:14:29.603 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:14:30.006  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:14:30.007  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:14:30.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:14:30.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:14:30.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:14:30.012  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:14:30.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:14:30.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:14:30.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:14:30.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:14:30.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:14:30.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:14:30.084 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:14:30.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:14:30.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:14:30.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:14:30.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:ef:a3:82:11:20:f0:b9:31:d4:e0:67:ce:ea:e3:36:20:ae:80:36]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:16:20.172  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:16:20.174 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:16:20.176 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-30 03:16:20.177 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:16:20.178  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-30 03:16:20.179  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:16:20.179  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:16:20.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:16:20.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:16:20.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:16:20.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:16:20.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:16:20.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:16:20.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:16:20.375  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:16:20.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:16:20.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:16:20.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:16:20.380  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:16:20.380  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:16:20.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:16:20.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:16:20.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:16:20.383 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:16:20.384 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:16:20.384 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:16:20.385 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:16:20.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:16:20.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:16:20.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:16:20.391 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:44:bf:5c:ad:d3:b8:a4:df:f9:18:6d:a4:f0:3a:ec:27:ca:ef:3c]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:19:34.088  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:19:34.089 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:19:34.091 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-30 03:19:34.091 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:19:34.092  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-30 03:19:34.092  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:19:34.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:19:34.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:19:34.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:19:34.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:19:34.098 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:19:34.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:19:34.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:19:34.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:19:34.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:19:34.280  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:19:34.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:19:34.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:19:34.285  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:19:34.285  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:19:34.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:19:34.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:19:34.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:19:34.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:19:34.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:19:34.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:19:34.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:19:34.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:19:34.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:19:34.291 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:19:34.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:81:87:24:fe:a7:00:70:f9:a8:9f:6d:a6:16:ae:58:0f:49:85:c7]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:19:34.500  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:19:34.501 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:19:34.503 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-30 03:19:34.504 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:19:34.504  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-30 03:19:34.581  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:19:34.582  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:19:34.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:19:34.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:19:34.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:19:34.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:19:34.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:19:34.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:19:34.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:19:34.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:19:34.681  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:19:34.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:19:34.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:19:34.684  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:19:34.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:19:34.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:19:34.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:19:34.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:19:34.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:19:34.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:19:34.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:19:34.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:19:34.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:19:34.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:19:34.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:19:34.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 9d2959281be4fefc79ca3c5c913e8011364c22e8cfd55feb6f9705f0114469a8852366e493bedad22199ca403040f6a6eb0be95571f97c18b4b58965cef09ce31fa1cad9f500b1fae4cf869409b52376bcfb7065b6935e3267c226d55068cefa1208142bc91775d4b163149b12e3c30de70decce98f7e954707d42e4bf912fa06719c00b69620ff144eaea95fef9b408933ff66b3a88c69c171705860e259a37c33cb61be2c94cf48d9b5ece0ccb2b636f333f2951e1340b13a225a5ec078bd36960bf787749d2753875c00d5003786ad3a2ef71a63c2588d15d5eff4ee8e41e4627eb3d0fcbbb6a8125b79a6758766a92084058391fdde9c633d8bd91eaa7d49982e8ee1f481b024a0a2a964550de72a6493d89a4c6cf724fb8351acaa5e906c6b3978dd71aa889b75e7b56585d1c8af9626201156722851c1c2b1af55444dfbd73530df22b8dd2cd98927ed097f6648f186db646928045664b6d695ab07e555f1caa7e98e5233978758ed730d39c5b72a67885791ea4fab51e5ebe847a60dd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:6a:52:4f:4a:e8:6c:5e:f8:ff:19:e1:41:92:2b:c0:7e:d2:11:e5]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:20:04.551  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:20:04.552 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:20:04.554 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-30 03:20:04.554 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:20:04.555  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-30 03:20:04.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:20:04.556  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:20:04.556 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:20:04.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:20:04.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:20:04.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:20:04.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:20:04.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:20:04.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:20:04.681  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:20:04.682  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:20:04.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:20:04.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:20:04.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:20:04.686  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:20:04.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:20:04.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:20:04.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:20:04.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:20:04.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:20:04.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:20:04.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:20:04.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:20:04.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:20:04.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:20:04.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:f8:e8:37:5a:aa:9e:e9:c0:b9:5b:b7:96:18:5c:1d:75:aa:2e:6b]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:20:42.047  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:20:42.048 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:20:42.050 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-30 03:20:42.050 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:20:42.051  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-30 03:20:42.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:20:42.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:20:42.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:20:42.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:20:42.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:20:42.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:20:42.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:20:42.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:20:42.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:20:42.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:20:42.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:20:42.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:20:42.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:20:42.182  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:20:42.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:20:42.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:20:42.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:20:42.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:20:42.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:20:42.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:20:42.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:20:42.188 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:20:42.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:20:42.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:20:42.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:20:42.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:8c:25:cc:28:ab:48:4d:69:7b:79:ce:26:6d:58:fe:54:44:33:cf]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:21:22.097  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:21:22.098 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:21:22.106 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-30 03:21:22.107 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:21:22.108  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-30 03:21:22.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:21:22.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:21:22.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:21:22.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:21:22.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:21:22.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:21:22.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:21:22.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:21:22.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:21:22.284  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:21:22.284  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:21:22.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:21:22.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:21:22.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:21:22.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:21:22.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:21:22.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:21:22.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:21:22.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:21:22.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:21:22.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:21:22.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:21:22.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:21:22.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:21:22.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:21:22.295 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:52:77:f5:23:16:5d:bf:67:c6:11:33:3d:87:04:70:78:53:9a:fe]
            modulus: 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
    public exponent: 10001

] 
2021-11-30 03:23:07.101  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-30 03:23:07.102 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-30 03:23:07.104 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-30 03:23:07.104 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-30 03:23:07.105  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-30 03:23:07.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-30 03:23:07.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-30 03:23:07.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-30 03:23:07.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-30 03:23:07.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-30 03:23:07.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-30 03:23:07.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:23:07.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-30 03:23:07.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:23:07.197  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-30 03:23:07.198  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-30 03:23:07.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-30 03:23:07.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-30 03:23:07.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-30 03:23:07.202  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-30 03:23:07.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:23:07.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:23:07.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:23:07.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:23:07.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:23:07.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:23:07.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-30 03:23:07.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-30 03:23:07.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-30 03:23:07.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-30 03:23:07.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 158958181019030668435527474973281218883550875382
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 30 01:39:00 UTC 2021
           Final Date: Sun Nov 30 01:38:59 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:11:b1:74:f6:61:c4:3e:96:c9:29:2a:bf:d8:bc:6a:b3:a0:fd:d5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 538cf5093cc8ccf636a14ca7acdd0ab7ff4367e5
                       97e44bde55138835851349a52a51507760e46d18
                       4ff9a423212888b4fe367ca4301d590328bdd0f6
                       7bcc685d206b511ed47ff71a5e9dfc09ac9942c6
                       6edb647df94f1a46922702094decc8aebac2c749
                       b68056ac95149c10cdc420db054c5c7f0159e93c
                       9bb21371464694232a19310cc91863b68ef0f394
                       7af416f47668857b529d8bf3c570c1d229e2e947
                       bf7cf0e6e895c40627b8709a19a67ff1eb44e99c
                       2a74681ef139b34af86500b7fec681fd282f24ba
                       4c50ae36b5a4f0658e750331733b34b9314e8cfe
                       c5d47b7e3b21a815a4366818178f25578a16f9d5
                       446ae4e96ebbbc02be4e0b7f0802aa41bd95ec43
                       0214c5def672ba310883e50065f75f75700ac7c5
                       b10b28a9c9379f450570cb1a0f7c573ef07ad1f3
                       2365c5fc6b186863b0fa1fb75de5d3716ff9e0db
                       8245fca3d408257a5db2e29ff1ec709e11323447
                       7275be9462febc0b2ae892d0e64294c8410c1062
                       0849c6f890f86f33fc501951bbb78b61454ae5f2
                       17a9957c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:51:bf:d8:08:37:ca:e3:3f:10:88:d3:ee:76:3d:a0:6f:2b:8b:00]
            modulus: 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
    public exponent: 10001

]