Results

By type

          2022-03-10 03:15:43,849 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-10 03:15:45,764 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-10 03:15:46.943  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 10, 2022 3:15:49 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 10, 2022 3:15:49 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 10, 2022 3:15:49 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 10, 2022 3:15:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-10 03:15:50.471 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-10 03:15:50.858  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-10 03:15:51.039  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-10 03:15:52.135 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-10 03:15:52.140 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-10 03:15:52.142 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-10 03:15:52.149 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-10 03:15:52.207 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-10 03:15:52.211 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-10 03:15:52.379 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-10 03:15:53.512 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 10, 2022 3:15:54 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-10 03:15:55.167  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.846 seconds (JVM running for 15.573)
Mar 10, 2022 3:16:17 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-10 04:01:10.359  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:01:10.374 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:01:10.435 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-10 04:01:10.441 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:01:10.463  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-10 04:01:10.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:01:10.468  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:01:10.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:01:10.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:01:10.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:01:10.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:01:10.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:01:10.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:01:10.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:01:10.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:01:10.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:01:11.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:01:11.334  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:01:11.334 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:01:11.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:01:11.346  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:01:11.348  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:01:11.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:01:11.349 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:01:11.349 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:01:11.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:01:11.367 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:01:11.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:01:11.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:01:11.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:01:11.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:01:11.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:01:11.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:5c:35:bb:29:4f:fb:61:04:96:63:e2:55:a1:47:e2:4a:d1:a9:63]
            modulus: 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
    public exponent: 10001

] 
2022-03-10 04:02:30.290  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:02:30.291 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:02:30.293 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-10 04:02:30.294 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:02:30.295  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-10 04:02:30.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:02:30.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:02:30.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:02:30.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:02:30.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:02:30.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:02:30.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:02:30.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:02:30.328 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:02:30.484  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:02:30.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:02:30.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:02:30.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:02:30.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:02:30.491  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:02:30.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:02:30.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:02:30.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:02:30.495 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:02:30.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:02:30.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:02:30.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:02:30.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:02:30.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:02:30.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:02:30.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:71:f9:c1:5a:5b:94:d7:ed:73:a6:43:9f:46:fd:ba:c6:db:68:90]
            modulus: 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
    public exponent: 10001

] 
2022-03-10 04:04:02.037  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:04:02.039 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:04:02.042 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-10 04:04:02.042 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:04:02.043  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-10 04:04:02.044  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:04:02.045  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:04:02.045 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:04:02.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:04:02.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:04:02.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:04:02.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:04:02.058 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:04:02.058 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:04:02.201  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:04:02.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:04:02.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:04:02.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:04:02.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:04:02.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:04:02.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:04:02.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:04:02.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:04:02.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:04:02.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:04:02.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:04:02.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:04:02.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:04:02.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:04:02.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:04:02.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:cd:fd:ef:29:22:38:7f:3f:27:7e:38:49:f3:15:5a:12:f6:be:2f]
            modulus: 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
    public exponent: 10001

] 
2022-03-10 04:05:24.149  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:05:24.150 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:05:24.152 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-10 04:05:24.153 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:05:24.154  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-10 04:05:24.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:05:24.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:05:24.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:05:24.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:05:24.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:05:24.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:05:24.164 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:05:24.164 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:05:24.165 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:05:24.298  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:05:24.299  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:05:24.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:05:24.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:05:24.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:05:24.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:05:24.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:24.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:24.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:24.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:24.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:24.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:24.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:24.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:24.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:24.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:05:24.316 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:78:e0:e4:f0:3b:28:96:49:31:92:69:09:8d:62:bf:a5:d5:46:fc]
            modulus: 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
    public exponent: 10001

] 
2022-03-10 04:05:55.000  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:05:55.003 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:05:55.005 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-10 04:05:55.006 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:05:55.007  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-10 04:05:55.008  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:05:55.009  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:05:55.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:05:55.010 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:05:55.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:05:55.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:05:55.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:05:55.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:05:55.022 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:05:55.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:05:55.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:05:55.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:05:55.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:05:55.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:05:55.203  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:05:55.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:55.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:55.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:55.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:55.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:55.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:55.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:55.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:55.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:55.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:05:55.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: b022491f9cd7cb01be5178ba0fac81604313043b630a9d71bb3bac36a0535b4950fcb793bb51f0f3e95a45a27911438ea6cbb0accec791cac42d75241c5d90736a2dc244f9f0ae917ed90f695a507024e4fda29e6c5d496555024f1bdba2da762b10b96424d40bc305734eec4f9cac839005da871fc61fce967e2b0c6d9f80e92fff017aa2c110d854eab2480a9e197f245976143ac46e858175c2fd9cc0e7cca067956c4e1102a19db4fcf87f0d25ab26d54a1180fd72aed4273d1e46e0bbd1ea1668eaa40bb3c426df80337d9b2c96984edb2bcaba01f6a5531bdac51d27af9048bf705ecda6626d9d69288e0ce8360735ae91dc72662ad3778b236ac74f6663b8b7204ff6ad16bb1f84882317bd1a5b69655dc9004ffc9d4251f935238381289a246bfd3de676f15766cbce1f2e5f58135894f6a9366b9a01d41bf28f057d35ce817a12c60b5376c72821fba68a5e1fac939ef0ebd571cc7ef37a9862bb299bcb2192b2b66e9a2c6cc5991242f651d80b8b01e88c591075a586af2be22117
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:e3:b2:f8:ce:f0:ea:8a:82:43:51:93:ea:59:33:f6:8f:ea:8f:69]
            modulus: d781e79f450e1e4da22354bc73697471abab89dfc0a258b24babd5a351245e6b6a36f1f62c1df58ba8e81aea75c936dd192983b3fa727fc96173ade999ec3289ccbccd4c2219a8b03f70623c4b22dd9f6f220a009da8e6c275f409c6033b0b6c15c3888a796f0500b8ddead833b844fea145aa5e932d28535187f901da71a7bc224ae00a7ab70aa086acdd876550189c5de60e600e81ac928d2fba05f63e94ee4511a9bf1ba31f219a7102cef0e769a1c2f1c9b77d56bcfc749fa82a14dc8eac61ae3426256cdbb0a5c2f5fb73ee094950362d9e1ebf9e7008c388eaa251659920f8948d07b550c10437ceb481fb446b21e74bf2f213ef0340a373d9ec043377
    public exponent: 10001

] 
2022-03-10 04:05:55.849  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:05:55.850 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:05:55.852 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-10 04:05:55.853 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:05:55.853  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-10 04:05:55.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:05:55.855  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:05:55.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:05:55.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:05:55.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:05:55.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:05:55.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:05:55.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:05:55.863 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:05:55.940  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:05:55.946  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:05:55.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:05:55.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:05:55.954  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:05:55.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:05:55.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:55.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:55.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:55.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:55.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:55.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:55.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:05:55.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:05:55.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:05:55.965 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:05:55.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:fd:0e:89:d0:2f:5f:bc:20:4f:86:cf:d0:d6:69:3d:08:ba:5a:b9]
            modulus: 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
    public exponent: 10001

] 
2022-03-10 04:06:29.722  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:06:29.724 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:06:29.726 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-10 04:06:29.727 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:06:29.728  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-10 04:06:29.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:06:29.729  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:06:29.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:06:29.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:06:29.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:06:29.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:06:29.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:06:29.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:06:29.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:06:29.859  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:06:29.860  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:06:29.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:06:29.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:06:29.863  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:06:29.863  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:06:29.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:06:29.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:06:29.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:06:29.866 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:06:29.866 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:06:29.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:06:29.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:06:29.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:06:29.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:06:29.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:06:29.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:09:ca:74:b6:93:5a:74:1b:ab:dd:df:6c:77:55:8f:7a:51:43:e7]
            modulus: cd64179d3de775224bce033ba83a83556d9d0197cb50fb5e3a53559174c8ecf84b2af509b65d864109870ffe097991d0be3bf42744fd925ab2046f0fdf36d8a20086b0b009ff2c9292a3f709d0c7de26a36f8aec1d658d7d1549d20855d2d39a400a02fcd120b0e44afc5266b7c1b5fb741b65e5578c4ceae639959ee17532a2c644f0562385f00eb1158e689b02f000303b6702060c642642110e86c281848cff66716e2826a1155a6e72e127bb8d2c53a8f6c8951276bd8461ada6288e2e5a702aa5da8cb4abd3450339311a6a5e22e90fac733596cb5017e453f5cf2257b1355a948b38601f54fbc98add2c7c2906090bea7c8fa60c4dff8197f5365aaead
    public exponent: 10001

] 
2022-03-10 04:08:16.653  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-10 04:08:16.657 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-10 04:08:16.662 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-10 04:08:16.662 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-10 04:08:16.664  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-10 04:08:16.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-10 04:08:16.665  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-10 04:08:16.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-10 04:08:16.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-10 04:08:16.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-10 04:08:16.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-10 04:08:16.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:08:16.673 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-10 04:08:16.673 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:08:16.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-10 04:08:16.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-10 04:08:16.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-10 04:08:16.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-10 04:08:16.815  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-10 04:08:16.815  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-10 04:08:16.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:08:16.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:08:16.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:08:16.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:08:16.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:08:16.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:08:16.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-10 04:08:16.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-10 04:08:16.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-10 04:08:16.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-10 04:08:16.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 100682702793283069845779332382699155943241736795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Mar 10 02:53:23 UTC 2022
           Final Date: Tue Mar 09 02:53:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f
                       643838a26d16eb894591c627dc1b5273b38cbc93
                       bb996eca40e6bde399c4b7bb0e5ffb49273b74d1
                       0aa4c2a8bae21a2bed7b7a240e4be13394d363f2
                       5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd
                       c907d39c78bab96d632c4ad0100bd5f99f599132
                       373b324bd57064c9e022432826b69a2d0362f518
                       1d81099b4af5dc1512b779932e1708063891174e
                       750082fac35c6d9d84005e1270c0443d627f6aa1
                       3f0b8497239dab98b16f2b8d5d621a1fce69b7f5
                       4bf3490c7db28570fb433ffcc5ba156eff1a62d6
                       fde1d9308aa3ed1d990eec1ac439942293fea500
                       e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1
                       2838ab5a43e6f726122be829efde4bc8fbcae2e0
                       d9e25b1738d5a5d0f021228c1b6b8599a4922234
                       d9a442f0f12cb422fa9627101f97d1dd4c34fab2
                       323b9c97f934256cf4afb5d57880517f94cba3bf
                       27402ce9bc1b47917943ae940e63d50201d95bde
                       ed1a5410f4619c7387e5889cbccff69b20f778d8
                       0eb83a58
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:78:d4:4d:00:1a:9f:d7:e2:b6:f8:23:e4:19:ab:20:91:31:db:fc]
            modulus: b097a70a82b91f2705f7132d7b6c4cd29db78e6884eb8a737eb850d1d09e76c1cdb6ea1da0715d520b542980d0d6d6812a3f5cbacf27e70f418160b4db995902c27220648d7270090bebd116be5b97905697b696c33b408a36f83c30f2a4bf44f920fd4f52fbc9bbd0670a1328424e997971e4b9086976bf7bc899dde19eb1c71e23d013177a2342eb7dd72eaa5e4acc4f18bdd11499de59f019a58a38e8b16fc1d0ea27148e98809b7e15c91a7d937e502e79aa052ada186885afc548c7be48dec9ba833ef0c03a44ccd255d8b8458114c0f7d65e592f846990e7c8f557812dc8fdf21050958c5ac9f9a1ad2b327d7dbdc5d5d68f002e4dba4ea86dbdeebafb
    public exponent: 10001

]