Results

By type

          2021-09-25 15:02:41,233 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-25 15:02:44,839 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-25 15:02:47.631  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-25 15:02:59.433 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-25 15:03:00.436  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-25 15:03:01.041  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-25 15:03:11.043  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.712 seconds (JVM running for 38.014)
2021-09-25 15:05:00.338  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 15:05:00.347 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 15:05:00.540 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-25 15:05:00.544 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 15:05:00.635  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-25 15:05:00.639  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 15:05:00.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 15:05:00.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 15:05:00.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 15:05:00.645 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 15:05:00.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 15:05:00.732 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 15:05:00.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 15:05:00.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 15:05:00.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 15:05:00.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 15:05:02.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 15:05:02.449  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 15:05:02.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 15:05:02.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 15:05:02.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 15:05:02.535  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 15:05:02.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 15:05:02.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 15:05:02.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 15:05:02.548 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 15:05:02.549 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 15:05:02.549 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 15:05:02.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 15:05:02.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 15:05:02.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 15:05:02.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 15:05:02.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:c8:1d:bc:52:b7:92:43:67:ba:18:e3:1d:25:e4:71:24:1b:6b:83]
            modulus: d4cde5d5f85eb8754f9c9549e663c8107b896eb491c98c05bd442cf1ad0153bf9031de636204e80be92e497b8068f4568bcae812b14157d847e6abcea0d3eaa6e334f73af64103a1c7cfbd8489f4dda6944d7c2dcac9407f96e02297f2c91b268f3079de85fa8cda596c4d357210bf5fa69981467e8ce29f32c26da62993222f50468cadedb6a80457ffd0cbc501a10249cd17104516dd8e241b826449d5fcb9aa5c1f5b363a4baa1a98db4508667db8fd766c02604004f8bd73bf5dacbe36a26a89b54242091f68bbcd667f565150ba3bd0fc5a2a286d2294c864f7aa3181d7bd72c7e1d9d9f1c903d5b15458f1cadc927d9054016465ad0d2391bae4a2228b
    public exponent: 10001

] 
2021-09-25 18:12:40.621  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 18:12:40.623 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 18:12:40.626 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-25 18:12:40.627 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 18:12:40.628  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-25 18:12:40.628  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 18:12:40.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 18:12:40.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 18:12:40.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 18:12:40.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 18:12:40.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 18:12:40.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:12:40.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:12:40.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:12:40.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 18:12:40.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 18:12:40.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 18:12:40.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:12:40.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 18:12:40.861  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 18:12:40.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:12:40.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:12:40.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:12:40.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:12:40.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:12:40.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:12:40.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:12:40.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:12:40.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:12:40.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 18:12:40.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:4f:71:3e:61:83:8b:04:f2:d2:08:83:97:e8:c4:7a:aa:91:ae:40]
            modulus: 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
    public exponent: 10001

] 
2021-09-25 18:15:54.042  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 18:15:54.043 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 18:15:54.045 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-25 18:15:54.045 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 18:15:54.047  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-25 18:15:54.047  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 18:15:54.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 18:15:54.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 18:15:54.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 18:15:54.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 18:15:54.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 18:15:54.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:15:54.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:15:54.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:15:54.222  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 18:15:54.223  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 18:15:54.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 18:15:54.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:15:54.230  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 18:15:54.230  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 18:15:54.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:15:54.231 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:15:54.231 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:15:54.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:15:54.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:15:54.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:15:54.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:15:54.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:15:54.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:15:54.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 18:15:54.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: b340e675c4a3c3deabafe891d6e385dfc77ff50bd8266705382b1ad8c9e115ca80ea036d4e9c50861ebf6c7cbe6c49d01d7e93144f14c7209ffc7c20e0dff7e472b235d165a102a154421736fcc7a88ad1b434d43d5a6991202f426289fc187c175e70a3bf889296336be56ed8f6e4cafd30d95d4889c5bf9e355a6e6d8fe1f441422479a86d553d5b6938769edcfec9272a05697fdfcc6599f3074916ad6b132c344e7ea0f81a82b42157a6ac260ab1dc7b7674083f96b700dc521207b0cf6b028a9457520070b97e4761a982d2747e0d9763fc780c57d30e1ffee2765f3025524f32b7929be0c16522a36ea21f46a8d0aaaf450a50819bbdaae582cd1fbfef74d0c0a22118205f38c7f2e8d1efd69353315497b4398f100e43686bc9ec2a2d33c324025640745ee1a378bde735f159137c6ca2e0b22f72284bafc9066119d6717e05a24eddbc2cc5aa63578e02762a4e0bd882a918eb9c3543b80547eeffba3850dc03ae96ddbaa5769d135bd04797130bff5ad3c7f48a10484f422c7b9b77
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:34:a0:c6:bd:b6:23:84:ae:20:7e:62:cd:ba:8f:54:62:a5:d8:65]
            modulus: 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
    public exponent: 10001

] 
2021-09-25 18:18:27.135  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 18:18:27.136 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 18:18:27.137 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-25 18:18:27.138 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 18:18:27.138  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-25 18:18:27.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 18:18:27.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 18:18:27.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 18:18:27.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 18:18:27.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 18:18:27.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 18:18:27.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:18:27.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:18:27.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:18:27.242  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 18:18:27.242  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 18:18:27.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 18:18:27.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:18:27.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 18:18:27.245  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 18:18:27.245 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:18:27.245 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:18:27.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:18:27.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:18:27.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:18:27.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:18:27.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:18:27.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:18:27.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:18:27.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 18:18:27.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:49:85:76:7d:f4:68:59:27:87:4d:25:9c:7a:7b:2a:52:56:64:bf]
            modulus: 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
    public exponent: 10001

] 
2021-09-25 18:23:00.277  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 18:23:00.278 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 18:23:00.280 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-25 18:23:00.281 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 18:23:00.281  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-25 18:23:00.282  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 18:23:00.283  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 18:23:00.283 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 18:23:00.284 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 18:23:00.284 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 18:23:00.288 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 18:23:00.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:23:00.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:23:00.289 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:23:00.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 18:23:00.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 18:23:00.415 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 18:23:00.415 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:23:00.429  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 18:23:00.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 18:23:00.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:23:00.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:23:00.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:23:00.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:23:00.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:23:00.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:23:00.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:23:00.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:23:00.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:23:00.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 18:23:00.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:96:8a:87:ee:7c:1e:5d:43:9c:a7:f3:67:05:e1:75:73:17:82:68]
            modulus: 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
    public exponent: 10001

] 
2021-09-25 18:24:13.974  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 18:24:13.976 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 18:24:13.977 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-25 18:24:13.977 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 18:24:13.978  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-25 18:24:13.978  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 18:24:13.978  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 18:24:13.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 18:24:13.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 18:24:13.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 18:24:13.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 18:24:13.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:24:13.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:24:13.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:24:14.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 18:24:14.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 18:24:14.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 18:24:14.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:24:14.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 18:24:14.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 18:24:14.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:24:14.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:24:14.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:24:14.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:24:14.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:24:14.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:24:14.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:24:14.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:24:14.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:24:14.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 18:24:14.137 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: b340e675c4a3c3deabafe891d6e385dfc77ff50bd8266705382b1ad8c9e115ca80ea036d4e9c50861ebf6c7cbe6c49d01d7e93144f14c7209ffc7c20e0dff7e472b235d165a102a154421736fcc7a88ad1b434d43d5a6991202f426289fc187c175e70a3bf889296336be56ed8f6e4cafd30d95d4889c5bf9e355a6e6d8fe1f441422479a86d553d5b6938769edcfec9272a05697fdfcc6599f3074916ad6b132c344e7ea0f81a82b42157a6ac260ab1dc7b7674083f96b700dc521207b0cf6b028a9457520070b97e4761a982d2747e0d9763fc780c57d30e1ffee2765f3025524f32b7929be0c16522a36ea21f46a8d0aaaf450a50819bbdaae582cd1fbfef74d0c0a22118205f38c7f2e8d1efd69353315497b4398f100e43686bc9ec2a2d33c324025640745ee1a378bde735f159137c6ca2e0b22f72284bafc9066119d6717e05a24eddbc2cc5aa63578e02762a4e0bd882a918eb9c3543b80547eeffba3850dc03ae96ddbaa5769d135bd04797130bff5ad3c7f48a10484f422c7b9b77
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:27:75:e5:bb:e5:f5:62:48:3d:2c:20:a6:f7:6d:02:c1:13:76:98]
            modulus: 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
    public exponent: 10001

] 
2021-09-25 18:25:48.118  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-25 18:25:48.119 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-25 18:25:48.120 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-25 18:25:48.121 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-25 18:25:48.121  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-25 18:25:48.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-25 18:25:48.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-25 18:25:48.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-25 18:25:48.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-25 18:25:48.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-25 18:25:48.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-25 18:25:48.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:25:48.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-25 18:25:48.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:25:48.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-25 18:25:48.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-25 18:25:48.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-25 18:25:48.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-25 18:25:48.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-25 18:25:48.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-25 18:25:48.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:25:48.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:25:48.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:25:48.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:25:48.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:25:48.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:25:48.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-25 18:25:48.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-25 18:25:48.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-25 18:25:48.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-25 18:25:48.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597132449804216322367055890231329393625056445461
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Sep 25 14:59:28 UTC 2021
           Final Date: Thu Sep 25 14:59:27 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:8b:83:16:89:9c:ac:cf:db:54:e4:fe:2b:8c:20:4d:ae:35:32:2d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 49c366fcc4e6a2e3e6be83954e47aef5fcf9e581
                       1c283199dd803216ac03710033fa357c1f567c1a
                       c5ce98ca86e3ff61c8132e31e2772fdcbc23698f
                       aac472617ec766ab1483e2fa218d338093ab5f0d
                       236ee071484aa14a7361dc48f08153fa2cb60044
                       8fcfcab6aca1422e2e124021b043ba747dc6d26d
                       1ec0cbb9d2aa11ab8eb8db2490e8eb9532ccd141
                       19cafe7f0bd22196ac95b3350a9491a728a0e084
                       3b37a9d22c0ba459977b7a83e892090f4e6908a0
                       10513dd2977b217f8b8fe9f12ebf3138a8aa963d
                       6dabe620290924979f4c5084edeb11d9000d6ff6
                       dfc9ff61443944bb5c482293c7e33721aabae3a2
                       7b674a96327361346257a9fd146117a4404b15be
                       f63c4487aba15a93426c3f6bb5a01a0a6427dfad
                       e0e434859bedf9c619ba9e14faaf977d84afcd1e
                       356bde5a0c08f0f06d1e26119092bacf95f46d53
                       8288268ef1830449caed9dc95c98b580df5cde2b
                       b96f788afd34c26780b246836e77de34315b0b87
                       b0930429af0aa333bd368ae4829020ac17b9d56e
                       3ba81931
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:f6:7e:bb:2c:94:9a:8a:55:72:63:c8:26:42:15:8b:f1:5c:3e:4c]
            modulus: a5216f218d25d8d244abbeeec59e85b457e7d4db428f82bd17a924b54bfdebb996fd2f5243cd918f30d03e86d65abc5f9ca20c402f912170de15e24a16f8b905f7e8b3be5821d3010be70775a64c3f72f2da69f7295ba777a5cc9257d7d0c7442916e264eef0ed46edd215087f9907219d80bc3cd5a11625e0108c0236293e1e1bfaa1cddfcd3125163eeac664ed9e3f5a1e7bbd7a63f53bcbcc19e7159e67153878219c885a435e0335f0fdac22cdba74158f52d78bb4da8e00a4262269eac7f5473b11aa9efcd3d7b06e54fff1157d5fe25cef6430bd602f87b457b803339e356ee65282f72260cb721343fd8f0fdf2cad000b9e3f4e1aa5c89728ade1c735
    public exponent: 10001

]