Results

By type

          2022-03-08 10:34:25,535 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-08 10:34:26,465 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-08 10:34:27.258  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 08, 2022 10:34:29 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 08, 2022 10:34:29 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 08, 2022 10:34:29 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 08, 2022 10:34:29 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-08 10:34:29.731 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-08 10:34:30.010  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-08 10:34:30.170  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-08 10:34:30.840 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-08 10:34:30.843 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-08 10:34:30.844 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-08 10:34:30.848 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-08 10:34:30.886 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-08 10:34:30.889 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-08 10:34:31.017 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-08 10:34:31.657 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 08, 2022 10:34:32 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-08 10:34:32.586  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.829 seconds (JVM running for 9.778)
Mar 08, 2022 10:35:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-08 10:35:16.664  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 10:35:16.677 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 10:35:16.719 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-08 10:35:16.723 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 10:35:16.743  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-08 10:35:16.745  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 10:35:16.746  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 10:35:16.748 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 10:35:16.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 10:35:16.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 10:35:16.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 10:35:16.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 10:35:16.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 10:35:16.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 10:35:16.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 10:35:16.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 10:35:17.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 10:35:17.505  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 10:35:17.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 10:35:17.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 10:35:17.518  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 10:35:17.519  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 10:35:17.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 10:35:17.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 10:35:17.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 10:35:17.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 10:35:17.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 10:35:17.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 10:35:17.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 10:35:17.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 10:35:17.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 10:35:17.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 10:35:17.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:cf:1f:5c:ba:c1:34:e7:41:ca:89:50:e3:f5:67:90:ad:7e:ce:51]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:34:03.023  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:34:03.029 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:34:03.034 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 12:34:03.036 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:34:03.037  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 12:34:03.040  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:34:03.042  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:34:03.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:34:03.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:34:03.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:34:03.051 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:34:03.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:34:03.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:34:03.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:34:03.256  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:34:03.257  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:34:03.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:34:03.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:34:03.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:34:03.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:34:03.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:34:03.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:34:03.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:34:03.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:34:03.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:34:03.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:34:03.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:34:03.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:34:03.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:34:03.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:34:03.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:c0:57:f1:f2:ae:60:a2:9b:0f:d6:c8:f3:44:41:a7:08:7f:2c:4d]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:34:59.703  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:34:59.704 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:34:59.706 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 12:34:59.706 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:34:59.707  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 12:34:59.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:34:59.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:34:59.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:34:59.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:34:59.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:34:59.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:34:59.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:34:59.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:34:59.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:34:59.868  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:34:59.869  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:34:59.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:34:59.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:34:59.873  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:34:59.873  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:34:59.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:34:59.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:34:59.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:34:59.875 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:34:59.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:34:59.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:34:59.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:34:59.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:34:59.878 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:34:59.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:34:59.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:5c:17:ff:f3:0b:16:39:3a:f8:c3:4c:fe:63:de:75:13:9e:d7:85]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:36:13.909  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:36:13.911 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:36:13.913 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 12:36:13.915 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:36:13.915  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 12:36:13.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:36:13.927  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:36:13.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:36:13.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:36:13.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:36:13.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:36:13.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:36:13.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:36:13.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:36:14.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:36:14.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:36:14.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:36:14.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:36:14.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:36:14.203  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:36:14.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:36:14.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:36:14.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:36:14.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:36:14.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:36:14.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:36:14.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:36:14.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:36:14.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:36:14.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:36:14.224 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:33:13:53:b0:00:83:77:67:61:5e:ae:c3:9a:66:9e:35:f4:97:98]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:38:34.199  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:38:34.204 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:38:34.206 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 12:38:34.208 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:38:34.208  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 12:38:34.209  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:38:34.209  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:38:34.210 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:38:34.210 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:38:34.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:38:34.218 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:38:34.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:38:34.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:38:34.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:38:34.369  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:38:34.370  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:38:34.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:38:34.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:38:34.373  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:38:34.374  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:38:34.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:38:34.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:38:34.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:38:34.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:38:34.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:38:34.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:38:34.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:38:34.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:38:34.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:38:34.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:38:34.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:f5:b0:03:09:ca:c3:ca:6f:d0:a9:ce:a4:95:7e:71:66:f8:d3:63]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:38:46.919  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:38:46.920 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:38:46.922 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-08 12:38:46.922 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:38:46.923  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-08 12:38:46.923  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:38:46.924  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:38:46.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:38:46.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:38:46.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:38:46.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:38:46.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:38:46.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:38:46.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:38:47.045  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:38:47.046  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:38:47.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:38:47.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:38:47.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:38:47.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:38:47.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:38:47.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:38:47.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:38:47.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:38:47.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:38:47.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:38:47.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:38:47.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:38:47.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:38:47.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:38:47.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:07:47:94:f7:0b:2d:62:94:d9:82:53:b1:5e:23:7f:fc:da:f1:b4]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:39:06.793  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:39:06.794 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:39:06.796 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 12:39:06.797 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:39:06.797  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 12:39:06.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:39:06.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:39:06.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:39:06.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:39:06.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:39:06.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:39:06.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:39:06.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:39:06.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:39:06.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:39:06.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:39:06.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:39:06.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:39:06.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:39:06.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:39:06.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:39:06.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:39:06.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:39:06.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:39:06.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:39:06.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:39:06.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:39:06.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:39:06.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:39:06.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:39:06.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:6f:e2:ed:4c:0a:c0:01:28:a2:f4:54:c8:66:a4:43:6c:e6:92:d5]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:39:43.984  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:39:43.985 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:39:43.987 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 12:39:43.988 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:39:43.988  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 12:39:43.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:39:43.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:39:43.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:39:43.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:39:43.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:39:43.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:39:43.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:39:43.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:39:43.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:39:44.134  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:39:44.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:39:44.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:39:44.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:39:44.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:39:44.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:39:44.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:39:44.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:39:44.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:39:44.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:39:44.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:39:44.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:39:44.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:39:44.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:39:44.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:39:44.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:39:44.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:d8:78:4e:2d:34:4e:b1:d6:1e:ab:ce:1c:d6:eb:94:70:78:7d:a4]
            modulus: c6aa208f00130519c351625804d9f7ba3a956b129b843b5eae387a1f094c4f36dd2a5658dabaaed2439d515379d167772606a4ff4e529dad56034d562ecc724e20bb929670c4214627b3eecd385b7691202da2eaa2507b5d672d4b81c8ad87f89a26ce955dc9f349bfc7e18d11fe4b12378a4bad34e0ea6714401e34f51067d2cd52faae2234275f83a20a8e68ec3d5e9e3eda0233c8a23fe7c9757a871234be8077edff1127b1bbef9f5734f3113515e22175994756f7696ac61005d011b1cff2b3b2bfce3ccb105328cacb11b3356fbdabd461ae18b2363febd67b59afdde2d60fc25f3529173d0af03f0d57f8d498266b52b2ded0f1efb2810edfd2fdbfd1
    public exponent: 10001

] 
2022-03-08 12:41:48.802  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:41:48.803 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:41:48.805 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 12:41:48.805 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:41:48.806  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 12:41:48.807  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:41:48.807  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:41:48.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:41:48.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:41:48.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:41:48.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:41:48.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:41:48.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:41:48.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:41:48.965  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:41:48.965  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:41:48.965 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:41:48.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:41:48.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:41:48.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:41:48.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:41:48.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:41:48.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:41:48.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:41:48.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:41:48.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:41:48.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:41:48.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:41:48.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:41:48.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:41:48.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:80:a7:ce:50:b2:1f:42:1c:92:5d:b1:89:87:ae:fd:61:09:56:52]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:52:12.579  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:52:12.583 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:52:12.587 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 12:52:12.588 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:52:12.588  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 12:52:12.589  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:52:12.590  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:52:12.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:52:12.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:52:12.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:52:12.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:52:12.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:52:12.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:52:12.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:52:12.797  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:52:12.798  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:52:12.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:52:12.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:52:12.801  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:52:12.801  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:52:12.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:52:12.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:52:12.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:52:12.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:52:12.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:52:12.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:52:12.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:52:12.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:52:12.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:52:12.807 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:52:12.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:ff:e1:52:02:d8:da:f2:f6:27:e8:40:c2:fb:d9:a1:ed:22:61:69]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:56:20.662  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:56:20.664 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:56:20.666 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 12:56:20.667 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:56:20.668  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 12:56:20.669  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:56:20.669  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:56:20.669 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:56:20.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:56:20.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:56:20.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:56:20.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:56:20.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:56:20.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:56:20.880  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:56:20.881  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:56:20.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:56:20.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:56:20.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:56:20.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:56:20.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:56:20.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:56:20.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:56:20.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:56:20.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:56:20.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:56:20.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:56:20.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:56:20.888 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:56:20.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:56:20.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:5f:bd:de:52:a5:6c:c8:af:02:5d:70:9d:6b:46:b3:51:a8:c5:4a]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:56:54.633  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:56:54.635 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:56:54.636 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 12:56:54.637 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:56:54.637  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 12:56:54.638  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:56:54.638  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:56:54.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:56:54.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:56:54.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:56:54.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:56:54.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:56:54.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:56:54.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:56:54.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:56:54.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:56:54.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:56:54.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:56:54.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:56:54.788  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:56:54.788 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:56:54.788 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:56:54.788 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:56:54.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:56:54.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:56:54.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:56:54.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:56:54.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:56:54.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:56:54.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:56:54.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:62:f0:81:ba:f4:a3:69:79:8a:c6:86:23:23:f7:19:7f:0c:6d:0e]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:57:28.606  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:57:28.607 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:57:28.609 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 12:57:28.609 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:57:28.610  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 12:57:28.610  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:57:28.611  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:57:28.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:57:28.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:57:28.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:57:28.616 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:57:28.617 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:57:28.617 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:57:28.617 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:57:28.741  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:57:28.742  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:57:28.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:57:28.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:57:28.745  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:57:28.746  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:57:28.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:57:28.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:57:28.749 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:57:28.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:57:28.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:57:28.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:57:28.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:57:28.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:57:28.755 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:57:28.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:57:28.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:20:8b:12:ce:be:aa:91:67:d4:b0:74:a3:0a:cf:67:59:bd:60:ed]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 12:59:15.720  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 12:59:15.721 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 12:59:15.722 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 12:59:15.723 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 12:59:15.724  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 12:59:15.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 12:59:15.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 12:59:15.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 12:59:15.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 12:59:15.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 12:59:15.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 12:59:15.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:59:15.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 12:59:15.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:59:15.896  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 12:59:15.896  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 12:59:15.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 12:59:15.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 12:59:15.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 12:59:15.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 12:59:15.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:59:15.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:59:15.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:59:15.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:59:15.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:59:15.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:59:15.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 12:59:15.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 12:59:15.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 12:59:15.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 12:59:15.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:33:28:81:93:dd:be:5d:ef:95:35:52:b1:d9:60:46:75:7e:a6:42]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:00:06.797  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:00:06.798 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:00:06.799 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:00:06.799 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:00:06.800  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:00:06.800  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:00:06.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:00:06.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:00:06.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:00:06.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:00:06.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:00:06.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:00:06.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:00:06.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:00:06.962  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:00:06.962  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:00:06.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:00:06.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:00:06.965  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:00:06.965  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:00:06.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:00:06.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:00:06.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:00:06.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:00:06.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:00:06.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:00:06.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:00:06.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:00:06.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:00:06.972 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:00:06.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:52:44:1f:95:7b:9d:4f:51:3f:0a:10:31:3f:fc:86:25:0a:ee:08]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:03:58.179  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:03:58.181 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:03:58.182 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:03:58.183 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:03:58.183  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:03:58.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:03:58.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:03:58.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:03:58.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:03:58.185 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:03:58.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:03:58.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:03:58.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:03:58.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:03:58.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:03:58.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:03:58.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:03:58.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:03:58.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:03:58.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:03:58.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:03:58.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:03:58.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:03:58.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:03:58.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:03:58.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:03:58.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:03:58.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:03:58.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:03:58.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:03:58.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:6f:89:bf:28:bd:46:9e:47:b6:e9:f9:8f:f6:4d:ae:1d:29:60:3a]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:04:34.752  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:04:34.755 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:04:34.757 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:04:34.758 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:04:34.759  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:04:34.760  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:04:34.760  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:04:34.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:04:34.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:04:34.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:04:34.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:04:34.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:04:34.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:04:34.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:04:34.924  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:04:34.926  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:04:34.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:04:34.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:04:34.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:04:34.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:04:34.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:04:34.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:04:34.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:04:34.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:04:34.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:04:34.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:04:34.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:04:34.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:04:34.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:04:34.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:04:34.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:e6:73:e7:55:3d:39:4d:70:56:1e:31:d9:03:dd:b7:be:c6:7a:a2]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:05:04.722  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:05:04.723 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:05:04.724 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:05:04.725 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:05:04.725  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:05:04.726  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:05:04.726  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:05:04.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:05:04.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:05:04.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:05:04.732 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:05:04.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:05:04.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:05:04.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:05:04.859  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:05:04.859  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:05:04.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:05:04.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:05:04.861  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:05:04.861  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:05:04.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:05:04.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:05:04.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:05:04.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:05:04.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:05:04.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:05:04.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:05:04.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:05:04.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:05:04.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:05:04.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:e9:da:7d:75:13:b6:1e:6f:73:a6:2b:0c:e3:c3:19:be:90:44:0c]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:07:52.285  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:07:52.286 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:07:52.287 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:07:52.288 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:07:52.288  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:07:52.289  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:07:52.289  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:07:52.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:07:52.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:07:52.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:07:52.295 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:07:52.296 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:07:52.296 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:07:52.297 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:07:52.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:07:52.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:07:52.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:07:52.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:07:52.490  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:07:52.490  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:07:52.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:07:52.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:07:52.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:07:52.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:07:52.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:07:52.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:07:52.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:07:52.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:07:52.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:07:52.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:07:52.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:41:c3:56:9a:63:a6:87:7b:fb:4f:5b:59:f0:eb:ec:d4:bd:77:89]
            modulus: c76f7671d8becc7f4fa1bbc6879a22f325d1f33c67c2297b57af5a7cf66e6b73949f43f70b96dbdf102cf33b388a1c5410a9d35e6b1871578d8ad8ea502399ba031bffc78d30f8813d4dff98f722bf278f222bfb55c4d86ec62ea0e4209ef0e5c28ce6a1eec7e8c7750761ff221eb2d7445f67d9f58f19b83ef35f083cfe38d6ebe4fff719a30a6aba6fcd9b4aef1d401f2896757bc69fb8c14a92f39e40b93e956f1e225622a5e667755e2d3b654ce27d8474d8fd58810ecac2b0d0e67c04a739ef1815ea6f72eeea60b4c9af623de4a9f000f614e7b97a51a6e52c0c8fdc4783082287af674c0b2dc946d6f6da1a2f52014c6bad42d83134ee80f267842a5f
    public exponent: 10001

] 
2022-03-08 13:11:40.854  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:11:40.855 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:11:40.856 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:11:40.857 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:11:40.857  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:11:40.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:11:40.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:11:40.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:11:40.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:11:40.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:11:40.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:11:40.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:11:40.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:11:40.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:11:40.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:11:41.000  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:11:41.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:11:41.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:11:41.002  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:11:41.003  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:11:41.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:11:41.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:11:41.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:11:41.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:11:41.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:11:41.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:11:41.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:11:41.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:11:41.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:11:41.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:11:41.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:89:3c:d9:f6:b6:16:4e:4b:f9:ed:7f:a5:18:25:cb:52:77:45:88]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:12:13.671  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:12:13.672 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:12:13.674 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:12:13.675 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:12:13.676  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:12:13.676  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:12:13.677  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:12:13.677 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:12:13.677 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:12:13.678 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:12:13.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:12:13.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:12:13.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:12:13.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:12:13.824  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:12:13.825  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:12:13.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:12:13.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:12:13.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:12:13.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:12:13.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:12:13.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:12:13.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:12:13.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:12:13.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:12:13.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:12:13.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:12:13.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:12:13.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:12:13.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:12:13.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:09:6f:8a:e5:94:1d:7b:eb:96:1e:eb:a7:44:ec:c2:4a:9b:6b:8a]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:12:47.743  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:12:47.746 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:12:47.748 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:12:47.748 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:12:47.749  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:12:47.749  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:12:47.750  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:12:47.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:12:47.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:12:47.751 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:12:47.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:12:47.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:12:47.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:12:47.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:12:47.957  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:12:47.958  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:12:47.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:12:47.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:12:47.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:12:47.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:12:47.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:12:47.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:12:47.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:12:47.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:12:47.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:12:47.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:12:47.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:12:47.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:12:47.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:12:47.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:12:47.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:12:21:9b:bc:79:13:31:b7:54:f6:88:36:f0:39:b1:74:81:b3:43]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:14:36.569  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:14:36.571 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:14:36.573 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 13:14:36.574 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:14:36.574  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 13:14:36.575  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:14:36.575  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:14:36.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:14:36.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:14:36.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:14:36.581 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:14:36.582 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:14:36.582 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:14:36.582 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:14:36.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:14:36.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:14:36.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:14:36.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:14:36.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:14:36.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:14:36.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:14:36.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:14:36.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:14:36.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:14:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:14:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:14:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:14:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:14:36.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:14:36.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:14:36.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:e0:00:82:48:e2:d5:0b:59:f3:f0:a4:13:12:3a:4f:81:e5:af:ad]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:26:23.096  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:26:23.102 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:26:23.107 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:26:23.108 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:26:23.109  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:26:23.110  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:26:23.111  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:26:23.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:26:23.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:26:23.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:26:23.122 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:26:23.123 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:26:23.124 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:26:23.124 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:26:23.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:26:23.316  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:26:23.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:26:23.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:26:23.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:26:23.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:26:23.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:26:23.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:26:23.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:26:23.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:26:23.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:26:23.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:26:23.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:26:23.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:26:23.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:26:23.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:26:23.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:db:a2:fd:6e:c6:de:5b:88:db:78:5e:4c:02:bf:c9:b8:c2:a0:15]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:30:11.886  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:30:11.887 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:30:11.889 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:30:11.889 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:30:11.890  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:30:11.890  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:30:11.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:30:11.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:30:11.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:30:11.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:30:11.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:30:11.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:30:11.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:30:11.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:30:12.105  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:30:12.105  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:30:12.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:30:12.106 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:30:12.107  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:30:12.107  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:30:12.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:30:12.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:30:12.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:30:12.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:30:12.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:30:12.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:30:12.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:30:12.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:30:12.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:30:12.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:30:12.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:b2:9a:8c:af:c5:13:37:09:f9:7a:f2:f4:e0:83:cf:ee:ed:0f:d3]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:30:45.376  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:30:45.377 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:30:45.378 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:30:45.379 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:30:45.379  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:30:45.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:30:45.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:30:45.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:30:45.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:30:45.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:30:45.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:30:45.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:30:45.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:30:45.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:30:45.536  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:30:45.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:30:45.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:30:45.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:30:45.539  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:30:45.539  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:30:45.539 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:30:45.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:30:45.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:30:45.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:30:45.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:30:45.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:30:45.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:30:45.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:30:45.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:30:45.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:30:45.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:6d:cb:69:15:99:78:cd:0b:e1:05:55:98:16:96:9a:fc:23:e9:8e]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:31:18.875  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:31:18.876 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:31:18.877 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:31:18.882 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:31:18.883  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:31:18.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:31:18.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:31:18.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:31:18.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:31:18.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:31:18.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:31:18.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:31:18.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:31:18.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:31:19.021  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:31:19.021  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:31:19.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:31:19.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:31:19.023  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:31:19.023  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:31:19.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:31:19.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:31:19.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:31:19.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:31:19.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:31:19.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:31:19.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:31:19.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:31:19.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:31:19.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:31:19.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:40:12:d0:96:e9:1f:d7:95:17:a2:b9:1c:19:a4:4d:65:66:01:0a]
            modulus: b93b1c1ac7ac1322a62d4a251d84c0a1bcea199d9fed9e89da290f59cc00df81d79bedaddcb8ea20a5aa4dd5ec1d880ec4f67c4f2fcbbf2a75023f07f5c18770c1c32db33482c70999d78abe123e5ad01c66d4fb3ef32c4ff5af800151d823c80ce25747a9a29fa70615b08cba9af9ba70e111769ba9ee0cc20f3fd7e70e661529fa1423b34ddd38171754c0e2a04120c0ed3f0b87aa87b02415dd6b7e9a6f7007528942ecfdee6db4867c3875aa9daf7129f481ae4884b87024ca87cbac6678dd4f2c393bb87c988e506619b2110ce9499d223a64129159919fb74125e06179306f92d52690a59dafe523fbdb44eb14af11cfde6c029a925de18f2782ddaf33
    public exponent: 10001

] 
2022-03-08 13:33:07.623  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:33:07.625 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:33:07.627 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 13:33:07.627 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:33:07.628  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 13:33:07.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:33:07.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:33:07.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:33:07.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:33:07.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:33:07.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:33:07.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:33:07.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:33:07.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:33:07.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:33:07.791  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:33:07.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:33:07.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:33:07.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:33:07.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:33:07.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:33:07.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:33:07.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:33:07.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:33:07.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:33:07.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:33:07.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:33:07.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:33:07.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:33:07.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:33:07.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:94:5e:67:6f:e4:c4:96:3c:6c:47:4f:34:4a:5b:d8:46:48:b1:eb]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:47:09.939  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:47:09.946 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:47:09.949 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:47:09.951 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:47:09.951  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-08 13:47:09.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:47:09.953  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:47:09.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:47:09.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:47:09.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:47:09.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:47:09.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:47:09.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:47:09.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:47:10.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:47:10.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:47:10.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:47:10.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:47:10.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:47:10.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:47:10.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:47:10.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:47:10.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:47:10.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:47:10.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:47:10.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:47:10.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:47:10.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:47:10.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:47:10.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:47:10.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:c4:64:bc:32:dc:05:db:8a:e9:4f:58:d9:90:0e:bf:53:be:86:ee]
            modulus: dcfc4eade8220e093d95e8135ef9e7ba75cbfcd4b14a465c0748ff1899aa9c92117cb092760139590f4b3549d673d90251c8491bbc58c3fba3bd2f49a49ba547eb45b2f52dddb776a9e788053377c30a6e0d4486aca0557bed900dc9310667270371f8f6116a99fe7edb762a6ceba59489eee8ace0a79ebd71f37c7f8259277954bd3679c6287b724bc5d67ead4158336ae709d188e60f656d64b15b7b16a1381fa2bd8f4c0e19bdc48c3c80fb35115c5ee6ff423b6e09a5ffe6feb5816c3743e3fb0d55c97e6a641f72434e05de720e0a9fac2d0c14410bf90ad288ed8d02ed8cee8c5b40dc431074ec9c29a9a2d008ce942788a6058a134fec6abc69f09195
    public exponent: 10001

] 
2022-03-08 13:50:59.523  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:50:59.525 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:50:59.526 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:50:59.527 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:50:59.527  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-08 13:50:59.528  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:50:59.529  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:50:59.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:50:59.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:50:59.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:50:59.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:50:59.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:50:59.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:50:59.536 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:50:59.695  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:50:59.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:50:59.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:50:59.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:50:59.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:50:59.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:50:59.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:50:59.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:50:59.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:50:59.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:50:59.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:50:59.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:50:59.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:50:59.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:50:59.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:50:59.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:50:59.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:56:b2:24:c3:19:59:a6:a5:80:f0:dd:d7:51:99:3a:22:64:c0:c0]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:51:33.162  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:51:33.163 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:51:33.164 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:51:33.164 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:51:33.165  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-08 13:51:33.165  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:51:33.166  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:51:33.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:51:33.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:51:33.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:51:33.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:51:33.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:51:33.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:51:33.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:51:33.344  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:51:33.345  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:51:33.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:51:33.346 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:51:33.347  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:51:33.347  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:51:33.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:51:33.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:51:33.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:51:33.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:51:33.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:51:33.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:51:33.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:51:33.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:51:33.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:51:33.351 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:51:33.354 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:c6:99:43:ad:e6:63:60:f0:11:e4:6b:62:19:c9:93:88:72:6b:1d]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:52:07.466  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:52:07.468 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:52:07.469 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:52:07.469 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:52:07.470  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-08 13:52:07.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:52:07.471  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:52:07.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:52:07.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:52:07.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:52:07.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:52:07.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:52:07.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:52:07.478 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:52:07.648  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:52:07.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:52:07.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:52:07.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:52:07.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:52:07.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:52:07.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:52:07.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:52:07.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:52:07.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:52:07.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:52:07.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:52:07.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:52:07.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:52:07.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:52:07.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:52:07.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:f2:09:90:f7:5f:57:67:74:cf:85:db:48:af:57:d9:ad:e3:97:f6]
            modulus: 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
    public exponent: 10001

] 
2022-03-08 13:53:57.756  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-08 13:53:57.757 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-08 13:53:57.759 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 13:53:57.759 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-08 13:53:57.759  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-08 13:53:57.760  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-08 13:53:57.760  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-08 13:53:57.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-08 13:53:57.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-08 13:53:57.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-08 13:53:57.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-08 13:53:57.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:53:57.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-08 13:53:57.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:53:57.898  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-08 13:53:57.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-08 13:53:57.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-08 13:53:57.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-08 13:53:57.900  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-08 13:53:57.900  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-08 13:53:57.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:53:57.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:53:57.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:53:57.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:53:57.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:53:57.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:53:57.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-08 13:53:57.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-08 13:53:57.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-08 13:53:57.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-08 13:53:57.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 365596617218722161808517527220339616662791506690
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 08 10:32:08 UTC 2022
           Final Date: Sun Mar 07 10:32:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f
                       d8b381fdf53edcdf56251051ebf20ba637cdbbc2
                       fae5863a422151d29748b55513a6d8e3dbdde89e
                       264d89f9bd4667863b93f3e272a1d9deadcc3541
                       6cb824a61fdcda2d6a65ca4b71124e406b7636b4
                       3a2128e3dd793d6935087ea2a2cb9af266a14a31
                       67517cb6b77998edb389ed6de31c70f36f7f5baa
                       13c26932e206eeaeb3451852766d271a1ad08f86
                       0c83f66af8bb8fb287537dc8cb123c94a6b9c910
                       f417d6455147e73ea2cd389cbba398a4b333017c
                       9a91d168367b1fe374019b63d56bb8a375ac3698
                       c1e0a622f77f6b10d323dfc20b8d95ababe54273
                       8422239c0f1a21a70608f284361a9c101742be5a
                       c41af115794b0103fcd803363e444117006b4eec
                       d71b00d068149554b2948ec291ba2d982adac7c8
                       91e9a0f5f6123e3bed231486c9fbb4189da4e5d8
                       cc44234e191aa8b03b9f88beb3d9085c959da5bb
                       f1e908e0103b71dfa590d448cfda874451dcffde
                       68b126244b2e0b942463eed2c0e986f45c22ef29
                       390fe251
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:a5:3c:69:77:c2:e8:04:43:c4:83:7a:54:c7:1e:6a:7e:fa:bf:11]
            modulus: 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
    public exponent: 10001

]