Results

By type

          2022-03-15 10:17:29,959 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-15 10:17:31,744 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-15 10:17:32.978  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 15, 2022 10:17:36 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 15, 2022 10:17:36 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 15, 2022 10:17:36 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 15, 2022 10:17:36 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-15 10:17:37.209 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-15 10:17:37.716  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-15 10:17:37.998  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-15 10:17:39.246 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-15 10:17:39.251 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-03-15 10:17:39.254 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-15 10:17:39.261 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-15 10:17:39.313 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-03-15 10:17:39.322 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-15 10:17:39.522 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-15 10:17:40.418 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 15, 2022 10:17:41 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-15 10:17:41.878  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 13.327 seconds (JVM running for 16.448)
Mar 15, 2022 10:18:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-15 10:18:28.559  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 10:18:28.569 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 10:18:28.647 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-15 10:18:28.654 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 10:18:28.675  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-15 10:18:28.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 10:18:28.682  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 10:18:28.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 10:18:28.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 10:18:28.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 10:18:28.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 10:18:28.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 10:18:28.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 10:18:28.817 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 10:18:28.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 10:18:28.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 10:18:29.755  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 10:18:29.758  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 10:18:29.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 10:18:29.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 10:18:29.779  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 10:18:29.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 10:18:29.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 10:18:29.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 10:18:29.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 10:18:29.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 10:18:29.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 10:18:29.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 10:18:29.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 10:18:29.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 10:18:29.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 10:18:29.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 10:18:29.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:e4:da:03:98:77:c4:dd:55:a0:80:f0:d2:08:7f:d5:53:b1:7a:4e]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:22:12.216  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:22:12.221 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:22:12.227 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 11:22:12.229 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:22:12.230  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 11:22:12.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:22:12.232  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:22:12.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:22:12.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:22:12.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:22:12.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:22:12.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:22:12.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:22:12.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:22:12.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:22:12.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:22:12.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:22:12.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:22:12.489  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:22:12.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:22:12.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:22:12.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:22:12.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:22:12.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:22:12.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:22:12.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:22:12.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:22:12.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:22:12.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:22:12.502 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:22:12.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:07:43:d2:6d:9f:3e:98:48:fc:c7:72:70:76:27:ce:ae:c4:48:fe]
            modulus: c0f53b4c3ea098a1815d7947d3e45e9c923b63d0b26625c9eed81d97de6bb20250e85286111d9d5b0b5a04359cabb75ed034ca102d876a536d67b7488b5953f4eec03f2fc571de9af81e23a40267c8320858bf3cc1594442628c5c7a308fc8f36e7c9dacb550d61c643cc32302610e9daf27afae473180911603f67fe7f57f2d4762905be1b6d8b852e28f9c86421ab1d484b4ce60757658fcf4a26997bf5d6cfe6c2abb8a49fc502d44a09b7ff041a031392eca9c1449518e89288468cd129a3d54c9369ffdbea57093268bb804b1a08db6f49daa5c9ff1c0b67041b396bf6e3b5e080101a007d666a067c92015d13aea19501b6eb43c7ec8c30d8133de2877
    public exponent: 10001

] 
2022-03-15 11:23:40.813  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:23:40.817 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:23:40.821 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 11:23:40.823 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:23:40.824  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 11:23:40.825  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:23:40.826  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:23:40.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:23:40.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:23:40.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:23:40.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:23:40.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:23:40.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:23:40.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:23:41.148  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:23:41.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:23:41.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:23:41.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:23:41.159  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:23:41.160  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:23:41.160 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:23:41.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:23:41.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:23:41.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:23:41.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:23:41.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:23:41.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:23:41.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:23:41.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:23:41.168 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:23:41.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:0b:f2:ab:a6:8a:12:6e:d3:1c:dc:b9:99:7b:3f:2c:7b:12:e7:99]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:25:13.877  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:25:13.880 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:25:13.882 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 11:25:13.883 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:25:13.884  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 11:25:13.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:25:13.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:25:13.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:25:13.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:25:13.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:25:13.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:25:13.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:25:13.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:25:13.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:25:14.100  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:25:14.101  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:25:14.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:25:14.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:25:14.106  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:25:14.107  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:25:14.107 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:25:14.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:25:14.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:25:14.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:25:14.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:25:14.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:25:14.111 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:25:14.112 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:25:14.112 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:25:14.114 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:25:14.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:12:14:c3:35:b1:c6:fd:37:cc:44:8f:9a:4a:24:1a:1c:45:53:10]
            modulus: e18874cf1b58bb21f041647212f270d797161da04055a97892685ee191909dbf827c89391dacf1f0871131d1765a56494ae86b42eec5479cde423ab074449d1c0fa3a40213a5bfd85a428069651345dd2e90cbe74d52dda7684d89ac258109320f52c0fbd482a040119aed9bbef78d45671fe18e62138a4a29e3b4ab8ff8f1f8b5c120cdc00163bdeb13da684183a603d95ae8ebfde630da69b955d37bf978458f77dc2aa9aaaae9228a974da1666bde0c7794ecf08da5403139af0a763595f11ff70a2db34fcfde52a1969187ac310bd9530d1c3e3d1f1454a0af06c6381b4f2a142acc25221e48a05304b2683548f0a1025550fbedf508108853d69c846f51
    public exponent: 10001

] 
2022-03-15 11:26:19.563  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:26:19.564 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:26:19.566 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 11:26:19.567 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:26:19.568  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-15 11:26:19.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:26:19.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:26:19.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:26:19.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:26:19.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:26:19.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:26:19.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:26:19.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:26:19.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:26:19.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:26:19.749  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:26:19.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:26:19.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:26:19.752  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:26:19.753  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:26:19.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:26:19.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:26:19.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:26:19.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:26:19.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:26:19.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:26:19.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:26:19.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:26:19.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:26:19.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:26:19.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: dfa9936f74f704e0d84bf5e5a37284f1b2e6fa43f5a5342a06d7caee1df07ebb109e93a32708821c7e450c541f0619766e3b08b60b2f6c3bf3d7e1764a55e6901749993a4d323c751217a2f14e3624d5a9bd06834a69bbb073fb278c20b459ba872e6ec08e788cc9849adbba4c8717d3f970bf0a73b4ccaa94552b3367c0da1dec984883246b28becfa70759b0d187fdd8c626d7a26c55d9945f63bff5c94a381085b3a125b2fbe7bee09b1f1e0f0382c8e95a36adee356f25285f20ea3a8803500b958f18b63f840a2e926ee6cc4b5f76c1fdd3c29783ffdbcbb94b67ef7c8264ab6fb35171cc15d48ce0c9e1a17baef9bcf5a1dca86edb1f03b12070eb559fb3911141c57a9f7c62a1795d3a2fc2902e807ff402861b80bc7cb6d94d6b3d0dc18e8f8008ab952c42963025ef482a71c0023c5113217c3561245b6259b6ddd8065549170907849a25f6cdbb89d9f0d7c816a3cf4f1c251d4290e82b498f816eacc3b54402b99ce50b6c8a27d5b17eba5d2e0866da9a286913c28111001395a5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:a1:cf:6a:b8:88:45:d2:bd:e6:e3:bc:1b:71:10:d6:5d:ab:52:30]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:26:51.627  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:26:51.629 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:26:51.640 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-15 11:26:51.641 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:26:51.642  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-15 11:26:51.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:26:51.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:26:51.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:26:51.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:26:51.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:26:51.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:26:51.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:26:51.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:26:51.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:26:51.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:26:51.911  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:26:51.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:26:51.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:26:51.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:26:51.914  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:26:51.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:26:51.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:26:51.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:26:51.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:26:51.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:26:51.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:26:51.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:26:51.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:26:51.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:26:51.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:26:51.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:7b:ab:fe:e2:d4:f7:80:8f:4e:47:24:c8:0c:3f:64:7a:f5:ee:38]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:27:27.221  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:27:27.223 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:27:27.224 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 11:27:27.225 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:27:27.226  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-15 11:27:27.227  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:27:27.227  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:27:27.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:27:27.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:27:27.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:27:27.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:27:27.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:27:27.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:27:27.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:27:27.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:27:27.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:27:27.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:27:27.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:27:27.478  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:27:27.479  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:27:27.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:27:27.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:27:27.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:27:27.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:27:27.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:27:27.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:27:27.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:27:27.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:27:27.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:27:27.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:27:27.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:26:d1:02:8a:12:c7:a0:4c:21:fc:98:a5:94:0f:13:4f:4d:77:f5]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:27:27.574  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:27:27.575 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:27:27.577 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-15 11:27:27.580 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:27:27.580  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-15 11:27:27.581  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:27:27.581  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:27:27.582 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:27:27.582 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:27:27.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:27:27.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:27:27.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:27:27.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:27:27.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:27:27.707  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:27:27.707  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:27:27.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:27:27.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:27:27.709  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:27:27.710  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:27:27.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:27:27.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:27:27.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:27:27.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:27:27.712 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:27:27.712 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:27:27.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:27:27.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:27:27.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:27:27.714 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:27:27.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:c0:4f:23:8d:53:87:ab:9a:a9:13:ef:85:56:b2:28:6b:9b:fe:f1]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:29:11.546  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:29:11.549 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:29:11.551 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 11:29:11.552 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:29:11.553  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-15 11:29:11.553  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:29:11.554  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:29:11.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:29:11.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:29:11.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:29:11.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:29:11.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:29:11.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:29:11.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:29:11.715  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:29:11.715  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:29:11.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:29:11.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:29:11.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:29:11.718  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:29:11.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:29:11.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:29:11.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:29:11.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:29:11.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:29:11.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:29:11.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:29:11.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:29:11.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:29:11.725 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:29:11.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:8d:73:ce:de:93:6c:66:78:b1:f7:dc:eb:33:94:02:3a:81:5d:c6]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:41:54.791  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:41:54.794 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:41:54.797 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 11:41:54.798 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:41:54.799  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 11:41:54.800  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:41:54.800  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:41:54.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:41:54.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:41:54.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:41:54.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:41:54.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:41:54.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:41:54.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:41:54.982  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:41:54.983  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:41:54.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:41:54.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:41:54.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:41:54.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:41:54.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:41:54.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:41:54.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:41:54.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:41:54.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:41:54.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:41:54.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:41:54.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:41:54.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:41:54.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:41:54.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:aa:59:fc:b5:94:6e:f5:7d:68:ce:eb:d4:a3:9a:33:ba:9b:73:4b]
            modulus: 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
    public exponent: 10001

] 
2022-03-15 11:51:59.918  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-15 11:51:59.921 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-15 11:51:59.924 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 11:51:59.925 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-15 11:51:59.926  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-15 11:51:59.926  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-15 11:51:59.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-15 11:51:59.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-15 11:51:59.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-15 11:51:59.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-15 11:51:59.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-15 11:51:59.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:51:59.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-15 11:51:59.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:52:00.125  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-15 11:52:00.126  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-15 11:52:00.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-15 11:52:00.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-15 11:52:00.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-15 11:52:00.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-15 11:52:00.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:52:00.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:52:00.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:52:00.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:52:00.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:52:00.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:52:00.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-15 11:52:00.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-15 11:52:00.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-15 11:52:00.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-15 11:52:00.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 353644600663169900784268165406587956692090962733
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Mar 15 10:15:16 UTC 2022
           Final Date: Sun Mar 14 10:15:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b
                       17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2
                       6dde5a4c22452faa5e10b78406c8d535eaed4f97
                       786f7e5879fe99f851f688f6cef155886cb6b459
                       8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd
                       505fea9a76c3c5e689362f806b8d611e65b87061
                       e3dd4230bf00b491066bac32cdf88b98db6d1be1
                       e8631471a9b6bed9bfb6849f093f2d5f3afecf6a
                       2c218d9536561af132faead22fb330b4f0e2a833
                       e8c48d7f831bab05d6e45d39842841acb694fc9a
                       c6c170fbfb740d4a189727f995eabdda2ff19f21
                       be2ed1ecee8f12a95ea25720b213e120c41c10eb
                       b53b7be830606d16ceab2e7c96027a5fcd0f6fc3
                       9b350e3bb866ce7c48afcc896ac3ca3f92cb629e
                       1c4756fba58f63ae6b4a2f6223a6fe312d2039f3
                       706627702d02aa35648ae9bd4f44b52a09dd3d3a
                       1c7537edbe30b8284be3849c9b65033cdbb81864
                       5c048a843267723e655d263e5561a26cc02ed77d
                       49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec
                       c64a4b4e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:13:07:13:4e:ff:49:b8:ff:cd:90:f4:f0:47:53:57:f5:51:96:68]
            modulus: a3be474ed3592e78618f07994e46cd8ab3fc6fbe852382fce668f239b0dc158f6f3c5cfb875f44596b92ada9a656d7a4eaf9bb3a1ba0e2d0701aa056a5600999e49e3142b89f50d41dfff57805336828fd498eca3ccea8ce669d36b49f2b7695bbc7512c5b8799f720394e8a5f29211419009292970b822eae517a2ad5b9ad08478b4ca1761d03b948ee9032138f159d54685594e6fb58f306f51161434ee520cfab96cd3c2f6e9309fcacf4b0cb7d30247f6059556dd2f105c9ce9219f7f800ec3d538148ce382e3dc43592b8b5a2dc6ffcf38169d7805b3bf16765aa4ec18549ef9adb9ec706ce20a077a9646b790a468d58159dd1e3b973a5850da50aebb7
    public exponent: 10001

]