Results

By type

          2022-03-30 03:00:28,896 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-30 03:00:30,725 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-30 03:00:31.648  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 30, 2022 3:00:34 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 30, 2022 3:00:34 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 30, 2022 3:00:34 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 30, 2022 3:00:34 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-30 03:00:36.182 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-30 03:00:36.592  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-30 03:00:36.982  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-30 03:00:38.404 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-30 03:00:38.409 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-30 03:00:38.412 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-30 03:00:38.419 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-30 03:00:38.471 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-03-30 03:00:38.474 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-03-30 03:00:38.637 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-30 03:00:39.409 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 30, 2022 3:00:40 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-30 03:00:40.612  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.815 seconds (JVM running for 14.986)
Mar 30, 2022 3:00:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-30 03:01:12.290  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 03:01:12.307 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 03:01:12.355 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-30 03:01:12.359 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 03:01:12.377  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-30 03:01:12.379  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 03:01:12.380  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 03:01:12.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:01:12.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:01:12.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 03:01:12.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 03:01:12.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 03:01:12.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 03:01:12.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:01:12.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 03:01:12.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:01:13.051  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 03:01:13.053  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 03:01:13.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 03:01:13.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 03:01:13.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 03:01:13.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 03:01:13.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:01:13.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:01:13.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:01:13.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:01:13.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:01:13.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:01:13.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 03:01:13.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 03:01:13.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 03:01:13.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 03:01:13.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 939f375860749c7c03118d31bab61c866324e17c83706f98fc61b5be8fb0ebd648f90fdb8e85cb3e5f43e79d532492f9ba1484d68b1a6e6171bac80afc3278b419d6bf364df4ba5696ed87e029eef89001ef7e1cbdb27e03e77009ae5500729046784a614fd04140d20aa9550a63612fe797add6e4bd52d0fb48804af3de573b6cc3bba00ee43c8f353c4ace2db331ffb2fcce517477b76ecfb181e307e7b088d020f8ad1433919c773cd260c5b691545fc48818da4c6c93d5cb08504f20d46272a386be62ca1e6ffdc9afb87011d54aab0b5ee5b2421f924bbbbe54f64685afcdce0129e684d049315bd2330e8760a09e7aacc94520d9a74f338075a59cc61e960f9175f21fc03d93094b3b90c862a098a502fe7b31e5d8bcd0f9edbec0422dfdca42e1b96cda47be579643d51be7e8d243bdc76543842eb923fb63f114ea2b6eb3d328ab39a0cc49ba492a7245053c55d33b5671987c5b56b08cadfcefd1fc532c99c71cc3745f6cf24106284c0ecf8fb3a8338c8666b8bb52cd4e5d9b8b5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:37:1c:3c:da:68:03:ae:c5:dc:11:b2:72:53:6a:4b:29:22:40:46]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:05:15.084  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:05:15.087 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:05:15.091 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-30 04:05:15.092 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:05:15.092  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-30 04:05:15.093  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:05:15.094  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:05:15.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:05:15.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:05:15.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:05:15.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:05:15.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:05:15.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:05:15.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:05:15.299  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:05:15.300  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:05:15.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:05:15.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:05:15.306  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:05:15.307  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:05:15.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:05:15.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:05:15.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:05:15.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:05:15.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:05:15.313 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:05:15.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:05:15.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:05:15.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:05:15.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:05:15.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:1b:7b:e1:15:a6:e7:a2:aa:53:b9:dc:db:af:fc:15:42:e2:60:76]
            modulus: b89361c5471c6ca6d9890e5e3dd20b3732fdfb9aceae71118a41ec42e698ba9c86ef36e1fa9b52a684ff85a415407277b786f16107c25a0087fb740a51f89d302e5f7cf0a5410a06b0fc30796b5645f232b97a98e939cc4a44972f6278001e0b47e91efc8806184fe0f3be03f88491525fecfac6c2cbd7f23841a294bf455bbab1ea23c61a6b5d1b174b09413c487d9abc254ecdd954ba46a8ca5c610591af69ab46da51ebeb2f7d5751d1e6e379d47d3b5dc55a7b4d6aae9a087aaca70fd29504cdf6bb61babdbb5dc70fc17d2e96e24144ef6c6dbdcb8384b05c9a24e281784c05e448455fe9ad8569a4f41ff846bce74d18963aef3c866ad5edf78ad55767
    public exponent: 10001

] 
2022-03-30 04:06:27.469  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:06:27.473 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:06:27.479 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-30 04:06:27.482 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:06:27.483  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-30 04:06:27.483  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:06:27.484  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:06:27.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:06:27.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:06:27.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:06:27.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:06:27.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:06:27.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:06:27.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:06:27.692  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:06:27.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:06:27.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:06:27.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:06:27.696  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:06:27.697  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:06:27.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:06:27.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:06:27.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:06:27.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:06:27.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:06:27.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:06:27.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:06:27.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:06:27.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:06:27.712 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:06:27.716 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:56:79:25:bc:17:0f:ee:60:66:5e:6a:68:57:6a:9a:d3:b2:a4:4e]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:07:59.614  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:07:59.616 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:07:59.619 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 04:07:59.624 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:07:59.624  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 04:07:59.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:07:59.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:07:59.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:07:59.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:07:59.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:07:59.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:07:59.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:07:59.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:07:59.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:07:59.828  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:07:59.829  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:07:59.830 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:07:59.830 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:07:59.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:07:59.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:07:59.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:07:59.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:07:59.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:07:59.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:07:59.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:07:59.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:07:59.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:07:59.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:07:59.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:07:59.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:07:59.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:82:aa:ef:c4:32:ba:ed:9c:72:8f:64:a3:58:34:8d:d4:32:47:cd]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:09:31.379  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:09:31.381 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:09:31.383 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-30 04:09:31.383 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:09:31.384  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-30 04:09:31.385  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:09:31.385  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:09:31.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:09:31.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:09:31.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:09:31.392 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:09:31.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:09:31.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:09:31.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:09:31.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:09:31.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:09:31.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:09:31.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:09:31.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:09:31.636  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:09:31.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:09:31.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:09:31.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:09:31.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:09:31.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:09:31.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:09:31.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:09:31.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:09:31.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:09:31.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:09:31.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:59:53:0d:9c:e2:23:7a:8c:d4:47:e5:a8:a2:46:a1:45:d5:f0:4b]
            modulus: cb9e0cdff84002a71b95daaed51898a4adc422412ecde9573b94001a19f972820a12385299173acfc5a98ef253bb66b598313f4bb1164972e00ef9da7a7b96ba4891ef8ccfcd4e91edbb7b11d2a420d06df4fc5cb7d678ba3eebbf8a1e3c0a67e49bcd1e2cc6a4bf71874e038d8cee5fa2133c6f5925fe1319202e50c3e9f47519f1507f0ade51d23a1183f0a8fc08da63108bc4e93ce7ebcaa6681e0e52aa68373ac85e4817d8bc28014756abf7078d9473c64a5eee63c3097f055293605c460af1923dcaba474c7d60293da7ce6d20a3b79a0c715ca2ca6b23c2b5652869eb71a0e08541def73c447086751e5bb1a54b9be204adacecb26ef4da7e6f87a0cb
    public exponent: 10001

] 
2022-03-30 04:09:31.767  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:09:31.769 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:09:31.771 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 04:09:31.772 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:09:31.772  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 04:09:31.773  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:09:31.774  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:09:31.774 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:09:31.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:09:31.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:09:31.780 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:09:31.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:09:31.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:09:31.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:09:31.891  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:09:31.891  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:09:31.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:09:31.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:09:31.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:09:31.896  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:09:31.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:09:31.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:09:31.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:09:31.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:09:31.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:09:31.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:09:31.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:09:31.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:09:31.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:09:31.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:09:31.926 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:df:ea:69:b6:4c:b9:0b:71:c2:ad:81:7e:89:10:d0:4a:ec:e0:2d]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:10:04.192  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:10:04.194 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:10:04.195 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-30 04:10:04.196 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:10:04.196  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-30 04:10:04.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:10:04.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:10:04.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:10:04.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:10:04.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:10:04.211 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:10:04.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:10:04.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:10:04.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:10:04.393  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:10:04.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:10:04.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:10:04.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:10:04.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:10:04.402  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:10:04.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:10:04.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:10:04.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:10:04.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:10:04.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:10:04.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:10:04.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:10:04.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:10:04.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:10:04.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:10:04.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:87:a5:d3:97:5b:9b:37:99:18:90:00:cb:67:bd:6b:a2:90:09:9e]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:10:38.163  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:10:38.165 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:10:38.167 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-30 04:10:38.168 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:10:38.169  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-30 04:10:38.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:10:38.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:10:38.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:10:38.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:10:38.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:10:38.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:10:38.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:10:38.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:10:38.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:10:38.327  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:10:38.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:10:38.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:10:38.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:10:38.330  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:10:38.331  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:10:38.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:10:38.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:10:38.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:10:38.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:10:38.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:10:38.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:10:38.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:10:38.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:10:38.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:10:38.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:10:38.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:56:dc:0e:1f:2b:fb:71:46:2a:cf:88:d4:a0:af:10:03:10:e9:9e]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:12:22.548  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:12:22.549 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:12:22.551 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-30 04:12:22.551 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:12:22.551  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-30 04:12:22.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:12:22.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:12:22.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:12:22.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:12:22.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:12:22.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:12:22.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:12:22.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:12:22.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:12:22.716  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:12:22.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:12:22.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:12:22.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:12:22.719  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:12:22.719  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:12:22.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:12:22.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:12:22.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:12:22.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:12:22.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:12:22.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:12:22.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:12:22.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:12:22.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:12:22.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:12:22.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:45:fc:6c:50:e1:54:21:0f:2b:80:7c:92:75:c2:18:35:72:26:a4]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:19:04.384  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:19:04.387 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:19:04.389 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-30 04:19:04.390 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:19:04.391  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-30 04:19:04.392  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:19:04.392  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:19:04.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:19:04.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:19:04.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:19:04.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:19:04.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:19:04.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:19:04.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:19:04.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:19:04.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:19:04.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:19:04.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:19:04.592  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:19:04.592  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:19:04.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:19:04.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:19:04.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:19:04.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:19:04.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:19:04.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:19:04.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:19:04.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:19:04.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:19:04.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:19:04.601 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:cf:33:3e:2f:b5:7a:bc:4b:40:f7:b2:dd:fd:42:56:9f:50:14:87]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:22:32.947  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:22:32.948 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:22:32.949 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 04:22:32.950 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:22:32.950  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-30 04:22:32.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:22:32.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:22:32.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:22:32.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:22:32.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:22:32.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:22:32.958 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:22:32.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:22:32.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:22:33.103  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:22:33.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:22:33.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:22:33.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:22:33.106  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:22:33.107  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:22:33.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:22:33.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:22:33.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:22:33.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:22:33.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:22:33.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:22:33.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:22:33.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:22:33.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:22:33.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:22:33.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:d6:a1:79:d2:16:c8:36:09:fa:3c:78:a6:2c:9e:45:88:62:9e:3d]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:23:05.854  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:23:05.855 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:23:05.856 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-30 04:23:05.857 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:23:05.857  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-30 04:23:05.858  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:23:05.858  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:23:05.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:23:05.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:23:05.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:23:05.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:23:05.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:23:05.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:23:05.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:23:05.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:23:05.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:23:05.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:23:05.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:23:05.994  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:23:05.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:23:05.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:23:05.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:23:05.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:23:05.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:23:05.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:23:05.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:23:06.014 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:23:06.017 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:23:06.017 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:23:06.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:23:06.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:6f:d2:44:8f:9f:ba:bd:af:4a:c3:97:86:16:ab:0c:ba:16:bb:10]
            modulus: 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
    public exponent: 10001

] 
2022-03-30 04:23:38.780  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:23:38.781 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:23:38.782 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-30 04:23:38.783 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:23:38.784  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-30 04:23:38.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:23:38.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:23:38.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:23:38.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:23:38.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:23:38.790 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:23:38.790 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:23:38.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:23:38.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:23:38.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:23:38.923  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:23:38.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:23:38.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:23:38.924  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:23:38.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:23:38.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:23:38.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:23:38.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:23:38.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:23:38.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:23:38.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:23:38.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:23:38.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:23:38.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:23:38.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:23:38.933 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 939f375860749c7c03118d31bab61c866324e17c83706f98fc61b5be8fb0ebd648f90fdb8e85cb3e5f43e79d532492f9ba1484d68b1a6e6171bac80afc3278b419d6bf364df4ba5696ed87e029eef89001ef7e1cbdb27e03e77009ae5500729046784a614fd04140d20aa9550a63612fe797add6e4bd52d0fb48804af3de573b6cc3bba00ee43c8f353c4ace2db331ffb2fcce517477b76ecfb181e307e7b088d020f8ad1433919c773cd260c5b691545fc48818da4c6c93d5cb08504f20d46272a386be62ca1e6ffdc9afb87011d54aab0b5ee5b2421f924bbbbe54f64685afcdce0129e684d049315bd2330e8760a09e7aacc94520d9a74f338075a59cc61e960f9175f21fc03d93094b3b90c862a098a502fe7b31e5d8bcd0f9edbec0422dfdca42e1b96cda47be579643d51be7e8d243bdc76543842eb923fb63f114ea2b6eb3d328ab39a0cc49ba492a7245053c55d33b5671987c5b56b08cadfcefd1fc532c99c71cc3745f6cf24106284c0ecf8fb3a8338c8666b8bb52cd4e5d9b8b5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:66:0e:25:26:00:07:1f:71:fb:bb:9c:8b:6c:0e:59:0c:0a:dd:1c]
            modulus: c90e8faa8fc3ac308d7238f98da419f0952f513bbec2da47e3dbe8ef5d72b3889a32e8a2036d5638ba39760d6885e3a0ead5a7f42677624375016a7c7abba28e012bccd2ac641fcb28f578907d011e9f57f9565939292c4c225a51010180ccbc52910ad4adff9b20c9a9a4a6b441c643a7036420180ced9df5cb3350f82f369ddfba98365281711b767b2d816b40e54d52b1aa3d43185384456505cf290412fe687bef4389dda63a3730a64590a2c71af5f6e3296aed0e5e686ff68f5eaf3d7425d12e7fdb3667a818db5c40324906ff7740b582b685ed4a5ed388d3024fa83eb59a8f3fbefd2ed1487c9978d3e5fc5600acc875cb0dfe92a52daa2ee8e05c21
    public exponent: 10001

] 
2022-03-30 04:25:24.617  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-30 04:25:24.619 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-30 04:25:24.620 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-30 04:25:24.621 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-30 04:25:24.622  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-30 04:25:24.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-30 04:25:24.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-30 04:25:24.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-30 04:25:24.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-30 04:25:24.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-30 04:25:24.630 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-30 04:25:24.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:25:24.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-30 04:25:24.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:25:24.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-30 04:25:24.803  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-30 04:25:24.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-30 04:25:24.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-30 04:25:24.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-30 04:25:24.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-30 04:25:24.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:25:24.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:25:24.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:25:24.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:25:24.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:25:24.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:25:24.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-30 04:25:24.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-30 04:25:24.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-30 04:25:24.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-30 04:25:24.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 601190543217511664527488459496336925827321394543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Mar 30 02:57:46 UTC 2022
           Final Date: Mon Mar 29 02:57:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:54:1a:e5:0a:1c:09:31:b9:01:7b:5a:45:fa:74:c3:67:5e:59:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ad9cb3352126b6f8c3ef4b3d6459e68cede50dc
                       6370205d68b2ec0a55684829311539630c59f3fc
                       5e943b17aa476143598d5df27efb5c5a920e0ec3
                       6ad8133bd843861a6fde5ac376c12177124faa17
                       58946f03731f3880b33050e975701718e567f0b0
                       4767b44af1f8fa1b59a801360a79180bbd5b9bff
                       99845cf70ab5c745f7d5684bfae440a19188a872
                       ba0a1d7cbb182bf121160afe2152303de2470465
                       483a315205f7cbb3e1993bf099708a4d4140e422
                       f3e0672a74d1a163fd5c9db5d88f26f393439e11
                       58c1b66d07511fdd66cb8ba397ef299bdff56cd6
                       e21194a71840afed805f0c1093c2847fcf5b4754
                       f8c588e8085a0b69efc9d6652a110bbd6283f7bf
                       13cf6e144e8be9353646a35d61f2aaf0a8e403c8
                       9c48c666b67e76bf8022920cb233082f798c578b
                       97e5cd8667072cc2b0f90cdd5e9c200e01028c61
                       2e789d3ec7d28353ec8787332c63fbd0383d5b26
                       5c85f11b5542a7c3ce933d504a345f11b6680a9c
                       3ef0f2a8bba4818a88d210101c95c7a827310507
                       70c25635
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:f0:2a:db:e2:a0:91:09:a6:16:dd:93:fa:e2:ab:5e:9c:96:2e:6d]
            modulus: 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
    public exponent: 10001

]